source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Kung%20Mamahalin%20Mo%20Lang%20Ako | (International title: If Only You Love Me) is a Philippine television drama romance series broadcast by GMA Network. Directed by Ruel S. Bayani, it stars Marian Rivera, Ehra Madrigal, and Camille Prats. It premiered on August 15, 2005 on the network's Dramarama sa Hapon line up replacing Saang Sulok ng Langit. The series concluded on February 17, 2006 with a total of 135 episodes. It was replaced by Agawin Mo Man ang Lahat in its timeslot.
Cast and characters
Lead cast
Marian Rivera as Clarisse Pelaez
Ehra Madrigal as Vanessa
Camille Prats as Joyce
Supporting cast
Oyo Boy Sotto as Segismundo "Sig" Lariza
Keempee de Leon as Alfonse Lariza
AJ Eigenmann as Gilbert
Bing Loyzaga as Mayor Amanda Lariza
Joseph Izon as Jerome
Chinggay Riego as Mrs. Oliver
Hermes Gacutan as Rudolph
John Apacible
Lara Melissa de Leon as Eleanor
Anne Villegas as Emilia
Gina Alajar
Tommy Abuel as Enrique
Symon Soler
Sheila Marie Rodriguez
Gio Alvarez
Bobby Andrews
References
External links
2005 Philippine television series debuts
2006 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine romance television series
Television series by TAPE Inc.
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/Agawin%20Mo%20Man%20ang%20Lahat | (International title: Stolen Love / ) is a 2006 Philippine television drama romance series broadcast by GMA Network. It stars Oyo Boy Sotto and Marian Rivera. It premiered on February 20, 2006 on the network's Dramarama sa Hapon line up replacing Kung Mamahalin Mo Lang Ako. The series concluded on August 11, 2006 with a total of 123 episodes. It was replaced by Pinakamamahal in its timeslot.
Cast and characters
Lead cast
Marian Rivera as Almira Dueñas-Valverde / Isadora Valencia / Alegra
Oyo Boy Sotto as Nicolas "Nick" Valverde
Bobby Andrews as Gonzalo Valverde
Mylene Dizon as Greta Valverde
Rita Avila as Clara Dueñas
LJ Moreno as Leda
Supporting cast
Perla Bautista as Meding Dueñas
Jake Roxas
Bernadette Allyson as Elizabeth "Beth" Lizadores
Cheska Garcia as Sissy Lizadores-Valverde
Matthew Mendoza as Chuck Lizadores
Alma Lerma
Gandong Cervantes
Kookoo Gonzales
Bea Candaza
Martin Escudero as Emmanuel "Emman" Dueñas
Kevin Santos
Luz Imperial
Frances Ignacio as Ingrid
Bugs Daigo
CJ Ramos
Neil Ryan Sese as Teodoro "Teddy" Besa
Carlene Aguilar as Giselle
Peter Serrano
Kakai Bautista as Rita
Joel Molina
Kevin Harris as Nol
Malou Crisologo
Guest cast
Nonie Buencamino as Ceding Dueñas
Wendell Ramos as Tristan
Johnny Revilla as Don Feliciano
Arci Muñoz as Chantal
Accolades
References
External links
2006 Philippine television series debuts
2006 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine romance television series
Television series by TAPE Inc.
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/WCHN | WCHN (970 AM) is a radio station broadcasting a news/talk format. Licensed to Norwich, New York, United States, the station is currently owned by Townsquare Media. WCHN has programming from Fox News Radio, NBC News Radio, Compass Media Networks, Premiere Networks, Radio America, and Westwood One.
References
External links
CHN
Townsquare Media radio stations |
https://en.wikipedia.org/wiki/WDLA%20%28AM%29 | WDLA (1270 kHz) is an AM radio station broadcasting a news/talk format. Licensed to Walton, New York, United States, the station is owned by Townsquare Media. It has programming from Fox News Radio, NBC News Radio, Compass Media Networks, Premiere Networks, Radio America, and Westwood One.
References
External links
DLA (AM)
Townsquare Media radio stations |
https://en.wikipedia.org/wiki/WDOS | WDOS (730 AM) is a radio station broadcasting a news/talk format. Licensed to Oneonta, New York, United States, the station is currently owned by Townsquare Media. It features programming from Fox News Radio, NBC News Radio, Compass Media Networks, Premiere Networks, Radio America, and Westwood One .
References
External links
DOS
Townsquare Media radio stations |
https://en.wikipedia.org/wiki/WCIG | WCIG (97.7 FM) is a radio station broadcasting a Christian radio format. Licensed to Big Flats, New York, United States, the station is owned by Family Life Network.
History
The station was assigned the call letters WNBR on August 28, 1987. On March 1, 1989, the station changed its call sign to WGMM; on May 16, 2005, to WCBA-FM; and on July 26, 2005, to WENI-FM. The station swapped call signs with its sister station in South Waverly, Pennsylvania, on December 27, 2017, assuming the WENY-FM call sign.
On June 1, 2021, WENY-FM changed its format from adult contemporary to Family Life Network's Christian radio format, assuming the call sign WCIG on June 22, 2021.
References
External links
Radio stations established in 1992
1992 establishments in New York (state)
CIG |
https://en.wikipedia.org/wiki/LackeyCCG | LackeyCCG is a computer program used to play virtually any collectible card game (CCG) against online opponents or for building and testing of CCG decks offline in a solitaire mode. It also allows for the searching of cards within each CCG. LackeyCCG currently has Mac, Windows and Linux versions (It has also been reported to be stable on Linux via Wine.). The program was created by Trevor Agnitti and is currently in its beta testing stage.
Plugins
Using LackeyCCG a person may play games such as Call of Cthulhu, Yu-Gi-Oh!, Pokémon and Magic: The Gathering. Players may create a plugin for use with LackeyCCG representing any CCG. Unlike programs such as Apprentice, LackeyCCG stores the card art for each card in the plugin. This is done so players may easily and quickly recognize cards being played. In addition LackeyCCG saves disc space and increases download speeds by using only one card image for each card, instead of four or more as programs such as CCG Workshop do. After installing or creating a desired plugin, players may also add additional plugins and may switch between the plugins to play different CCG's.
For copyright reasons, LackeyCCG does not come with any plugins aside from a basic plugin which shows users a template for making their own plugin, but users have shared the plugins they have made.
Independent CCG Plugins
The LackeyCCG software is also being used to develop a number of independent games, including Duality and Realms at War. Other plugins, while not on LackeyCCG, are being developed and are pending release, at various stages of completion.
Gameplay
Players may connect with one another using an IP address or by using a server associated with LackeyCCG. Since LackeyCCG will accommodate multiple CCG's, it does not come with a rules engine. As such, players are responsible for keeping track of any point totals and moving all cards to the appropriate playing zones. Lackey has included many tools for tracking health, turns, and phases within each turn.
Through the use of forums players can organize everything from one time sit down games all the way up to tournaments. The use of the Lackey Forums can aid in tracking games as well as finding new people to play with.
Recently, Card Arena, a league site supporting Lackey, was released allowing for organized play in ladders and tournaments using the LackeyCCG program.
Currently all LackeyCCG versions are free programs, but the designer has plans to make a premium version in addition to the free version.
List of Plugins
Following is a list of all the plugins for LackeyCCG shared by users.
Aliens vs. Predator Collectible Card Game
Anachronism
Arkham Horror: The Card Game
Babylon 5 CCG
Battlestar Galactica CCG
BattleTech CCG
Beyblade Trading Card Game
Bleach TCG
Blue Moon CG
Case Closed TCG
Call of Cthulhu CCG
Dark Eden
Digimon TCG
Digimon CCG Online
Duel Masters TCG
Duality
Epic Battles TCG
Fire Emblem Cipher
Fullmetal Alchemist TCG
Gundam War CCG
Hecatomb TCG
Harry P |
https://en.wikipedia.org/wiki/Linda%20Simensky | Linda Simensky is a production manager of various works of animation. Simensky served as an executive for Nickelodeon and Cartoon Network. She is partly responsible for the development of shows such as Samurai Jack.
Early life
Simensky graduated from University of Pennsylvania in 1985.
Career
Simensky received the June Foray Award in 2000.
On October 28, 2003, the Public Broadcasting Service appointed Simensky the position of senior director of children's programming.
In 2021, she joined Duolingo as head of animation and scripted content.
Views of gender in animation
In the 2008 book, Art in Motion: Animation Aesthetics, Simensky stated that many male animators find difficulty in creating strong, positive female characters with substance that can serve as role models. When she questioned the creators of Rocko's Modern Life, one of the series which she produced, why the women in the series were invariably drawn to be well-endowed, she was told that the animators believed that drawing women "the traditional way" was easier. Simensky described the creators as "talented guys" who formed "a boy's club" and added that "we pushed them to be funny, but a lot of their women are stereotypical."
References
External links
Women in the Animation Industry--Some Thoughts
Supporting Independents: Five Champions
O Canada: - Canadian animators
Cartoon Network executives
Women television executives
Nickelodeon executives
Living people
University of Pennsylvania alumni
Year of birth missing (living people)
Duolingo |
https://en.wikipedia.org/wiki/Open%20Computing%20Facility | The Open Computing Facility is an ASUC
chartered program at the University of California, Berkeley, first founded in
1989.
The OCF is an all-volunteer, student-run, student-initiated service group
dedicated to free computing for the greater academic community of the
University of California, Berkeley. Its stated mission is to
provide an environment where no member of Berkeley's campus community
is denied the computer resources he or she seeks, and to appeal to all
members of the Berkeley campus community with unsatisfied computing
needs and to provide a place for those interested in computing to
fully explore that interest. Here, the term
"campus community" does not include all area residents and excludes
those persons without official connection to either the university or
a university-sanctioned
organisation.
As part of the OCF's goal of being open and inclusive, the OCF publishes
its board meeting minutes,
tech talks,
and Unix system administration DeCal materials
online for all to see.
The OCF provides the following services to UC
Berkeley:
A Debian Linux computer lab
Webhosting for individuals and student groups
Linux shell access
Email forwarding
Limited free printing per day and per semester
Software mirrors of popular Linux distributions and open source projects, available over rsync, http, and https
A Unix system administration DeCal
References
External links
Open Computing Facility
Open Computing Facility Documentation
Open Computing Facility Status Blog
Open Computing Facility
1989 establishments in California |
https://en.wikipedia.org/wiki/Affinity%20Labs | Affinity Labs is a company that builds social networking sites for niche groups such as firefighters, police officers, nurses and the Armed Forces. In January 2008, Affinity Labs was acquired by Monster Worldwide for US$61 million.
Affinity Labs sites have over a million registered members, as of January 2008. PoliceLink, aimed at law enforcement personnel, is one of Affinity Labs' most active sites with over 717,000 unique visitors per month. Other sites include: SalesHQ, ArtBistro, TheApple, FireLink, NursingLink, InsideTech, GovCentral, IndiaOn, Excelle, AllHealthCare, and the European communities, HMForces.co.uk, ProNurse, and WerPflegtWen.
In 2008 after Monster acquired Affinity Labs, it then bought a French military website, Armees.com for an undisclosed fee, then transferred the site to its Affinity Labs social networking vertical.
Affinity Labs still successfully operate across North America but in March 2012 it shut down its European operations. Despite HMForces.co.uk being its most successful vertical, and having shared resources with Military.com, the global recession did not assist its longevity. HMForces.co.uk still has a strong presence on social networking sites to this day, evidence of its popularity. Further references to this military vertical can be found on UK e-commerce sites, and there is also a HMForces blog still surviving despite it not being updated regularly. However most Affinity Labs social networking domains and content have been amalgamated into the Monster Worldwide global brand as of 2021.
History
Affinity Labs was founded by Christopher Michel in 2006 after he sold Military.com to Monster in 2004 for $40 million.
The Mayfield Fund and Trinity Ventures invested in Affinity Labs prior to its Monster Worldwide buyout.
Between 2010 and 2014, the President of Military Advantage and Vice President of Monster Worldwide, was former Navy Admiral Terry McCreary. He oversaw the military Affinity operations in Europe which had a product manager in London reporting to the former Admiral in the US. However, this operation was closed down in 2012 after Monster unsuccessfully bid for a Recruiting Partnering Project (RPP) with the UK's Ministry of Defence. Capita won and signed the contract worth £44 million over 10 years.
References
External links
Official site
HMForces.co.uk
Internet properties established in 2006
Monster.com |
https://en.wikipedia.org/wiki/IEEE%20Computer%20Graphics%20and%20Applications | IEEE Computer Graphics and Applications (often abbreviated IEEE CG&A) is a magazine on computer graphics published by the IEEE Computer Society since 1981.
It is published six times a year.
Content
As a magazine, CG&A features shorter and less technical content than would appear in an academic journal, meant for both experts and non-experts and often tutorial in nature. CG&A connects the theory of computer graphics to its practice, providing coverage on topics including modeling, rendering, animation, (data) visualization, HCI/user interfaces, novel applications, hardware architectures, haptics, virtual and augmented reality systems, and medical imaging.
One of its publishing innovations was the first animated hologram to appear on a magazine cover. The hologram, on its July 1988 cover, featured the baby from the 1988 Pixar short film Tin Toy, opening and closing its mouth.
Perhaps because of its familiarity to visualization researchers, publications in CG&A have been used as a test set for works studying the visualization of citation networks. One such analysis, for an 18-year range of publications from CG&A, details the most frequently cited journals, works, and authors from articles published in the magazine, and relates a factor analysis of the articles to their subtopics.
Editors-in-chief
The following people have been editor-in-chief:
Abstracting and indexing
The journal is indexed and abstracted in the following bibliographic databases:
For most of the years it has been listed, SCImago Journal Rank has ranked CG&A as a second-quartile journal in computer graphics and computer-aided design.
References
External links
Magazines established in 1981
Computer magazines published in the United States
Bimonthly journals
IEEE publications |
https://en.wikipedia.org/wiki/Dorchesterway | The Dorchesterway was a parkway planned by 19th century landscape designer Frederick Law Olmsted to be a continuation of the Emerald Necklace park network in Boston, Massachusetts. This plan, however, was never implemented.
History
Olmsted's vision
The Emerald Necklace, as extant today, has a sort of "L" shape. It starts at the Boston Common near Downtown Crossing and extends out to the Arnold Arboretum (which starts in Forest Hills but has portions in Roslindale near the West Roxbury border). It then changes direction back inwards as the Arboretum connects via the Arborway to Franklin Park.
Olmsted wanted the Emerald Necklace to continue via the Dorchesterway to the shore of Boston Harbor's Dorchester Bay and thus form a "U" shape. He intended Columbia Road in Dorchester and the Strandway (the southern roadway of which is now known as William J. Day Boulevard) in South Boston to connect South Boston's Marine Park and Pleasure Bay to the network of natural-looking green spaces he had designed.
However:
...conditions of Columbia Road when the parks system was being established [...] precluded this vision from becoming a reality. When Columbia Road was formally designed in the late 1800s, there was already a relatively high density of buildings. The road had street rails that were used by a streetcar trolley connecting Uphams Corner and Franklin Park. There was a grass strip in the center and roads on either side, one for commercial traffic and the other for pleasure traffic. As a result, Columbia Road failed to serve the purposes of either the businesses or the pleasure travelers well, and there was not enough room for what Olmsted considered a proper parkway.
Later changes
Some trees and planters were added on Columbia Boulevard in the late 1980s.
In the last decade, the Boston Department of Parks and Recreation planted and has been maintaining trees, grass, planters and other vegetation along one section of Columbia Road.
But despite the recent greening of parts of Columbia Road, natural elements in this area remain meager due to the dense neighborhood development. For this reason, the corridor is not a parkway along the lines of other sections of the Emerald Necklace in nearby Jamaica Plain, and Columbia Road is not considered part of the Emerald Necklace.
The Boston bid for the 2024 Summer Olympics proposed private funding to remove the median of Columbia Road and install trees and separated bike lanes, but the bid was withdrawn in July, 2015.
Proposals
It is possible that some incarnation of a Dorchesterway connecting the Emerald Necklace to the seashore might someday come into being. Members of the Emerald Necklace Conservancy, expressing a long-term vision for the Boston Parks system, have proposed using Columbia Road to enhance the connections between Franklin Park, Marine Park and Pleasure Bay via Columbia Road. Linking to South Boston has also been discussed. According to Simone Auster, former director of the Emerald Ne |
https://en.wikipedia.org/wiki/Western%20Animal%20Rights%20Network | The Western Animal Rights Network (WARN) first appeared in 2005 as a coalition for animal rights groups in the West of England and South Wales and acted as a news service for animal rights demos and action reports.
It re-launched in August 2007 and continued to work towards total animal liberation using direct action and protests to fulfil this goal. There was also an expansion to include not just South Wales but all of Wales, providing the country with its first animal rights national group.
The website is also used by the Animal Liberation Front (ALF) in the same way the international group use the magazine Bite Back to anonymously report their criminal activities. Under a disclaimer stating that the network does not "encourage any illegal activities", the group publishes claims of various forms of illegal liberation and vandalism, including acts against McDonald's, KFC and the property of hunters.
Campaigns and actions
Stop Sequani Animal Testing
Sean Kirtley
Following the arrests of the Stop Sequani Animal Testing (SSAT) campaigners in May 2006, when 13 animal rights activists were arrested under the Serious Organised Crime and Police Act 2005 (SOCPA), WARN supported six of the activists who had the most serious charges against them. Similar to the SHAC 7, six individuals who received jail sentences in the United Kingdom of between 3–6 years for using their website to "incite attacks" on those who did business with Huntingdon Life Sciences, the campaigners have been called the Sequani Six after a seventh accepted a plea bargain.
in 2008, Sean Kirtley was jailed for four and a half years for a sustained protest campaign and David Griffiths received a 30-week prison sentence, both for conspiracy to interfere with the contractual relationships of an animal research organisation.
December March 2007
On 15 December, approximately 100–150 demonstrators marched against Sequani Ltd in Ledbury town centre. Section 12 and Section 14 of the Public Order Act were applied to limit the number of protesters then going to the laboratory to a maximum of fifteen. A spokesperson for WARN argued that the policing was heavy-handed, resulting in a female protester thrown back by police for distributing leaflets.
During the march, activists attempted to blockade a road near the High Street, in solidarity with the Sequani Six. Two activists were arrested for trying to D-lock themselves together, whilst another three locked together using arm tubes, which were then eventually cut to release the individuals. The five were arrested and released on bail later that evening until February 2008.
Carnival Against Vivisection
It was promoted by various sources, through local media, activist based, and by the network, that a Carnival Against Vivisection was to be held in Ledbury, without an original source for the organising of the event. As the police called for organisers to step forward and reveal their identities, protesters said they were demonstrating in solidar |
https://en.wikipedia.org/wiki/KZDC | KZDC (1250 AM, "ESPN 1250") is an all-sports-formatted radio station in San Antonio, Texas, owned by Alpha Media. Most of the programming comes from ESPN Radio. Its studios and offices are located on Eisenhauer Road in Northeast San Antonio.
KZDC broadcasts at 25,000 watts by day using a non-directional antenna. To avoid interfering with other stations on 1250 AM, it drastically reduces power at night to 920 watts and uses a directional antenna. The daytime transmitter site is just off U.S. Route 281 near Interstate 410, in the Mission del Lago district of San Antonio. The station uses a separate nighttime site which is co-located with sister station KTSA 550, along Eisenhauer Road in Northeast San Antonio, across the street from the studios.
History
Early years
The original construction permit for what would become KEXX was initially granted by the FCC on July 16, 1952, to Manuel D. Leal. KEXX was to initially operate as a daytime-only station with 500 watts of power on 1250 kHz. The station originally signed on January 1, 1953, and would receive its license to cover on February 9, 1953, a little over a month later. The station's studios were originally located on 501 West Quincy Street. KEXX originally broadcast a Spanish-language full service format centered on traditional Mexican music.
On February 2, 1959, KEXX made a brief diversion to an English language format under the call letters KARS, operated by Les Miller Enterprises. Leal continued to hold the broadcasting license. By February 21, the previous call letters and format had been restored.
KUKA: "Fiesta Radio"
In November 1959, KEXX, while retaining the same format, changed its call letters to KUKA, which it bore for the next 24 years. The station took its call letters from a station secretary whose nickname was Kukita.
In May 1961, Leal sold KUKA to Por Favor, Inc., a company controlled by local attorney Alex Coe and son Marshall, for $200,000. The sale was completed on June 1. Under the Coes, the format largely remained the same. It was also under their stewardship that the station adopted the "Fiesta Radio" positioner.
On November 17, 1965, KUKA was granted authorization to broadcast at 1,000 watts, still as a daytime-only station. On August 23, 1979, KUKA was granted a construction permit to allow unlimited operation, with 1,000 watts at all times.
Stuart Epperson would acquire KUKA and Por Favor, Inc. from the Coes on July 28, 1981, for $850,000. Epperson already owned classical station KMFM (96.1 MHz) through holding company Classic Media; Epperson had acquired it in 1977. The sale closed in December, and under the new owners, the station changed to a bilingual Christian format presented primarily in English; The format featured a mix of Contemporary Christian music and talk programming. 17 staffers lost their jobs as a result of the switch. Newly appointed general manager Mel Taylor stated that the switch was made because the station's overall position in ratings and r |
https://en.wikipedia.org/wiki/Taos%20language | The Taos language of the Northern Tiwa branch of the Tanoan language family is spoken in Taos Pueblo, New Mexico.
Sociolinguistics
In data collected in 1935 and 1937, George L. Trager (1946) notes that Taos was spoken by all members of the Taos Pueblo community. Additionally, most speakers were bilingual in either Spanish or English: speakers over 50 years of age were fluent in Spanish, adult speakers younger than 50 spoke Spanish and English, children around 5 years old could speak English but not Spanish—generally a decrease in age correlated with a decrease in Spanish fluency and an increase in English fluency. Pre-school children and a few very old women were monolingual Taos speakers.
A more recent report by Gomez (2003) notes that the language "until a few years ago remained viable only in age groups of thirty and older", a sign that Taos is being affected by language endangerment pressures. Nonetheless, it is one of 46 languages in North America that are being spoken by significant numbers of children as of 1995 (Goddard 1996). The most recent estimate is from 1980 with about 800 native speakers out of 1600 ethnic population (50% of the population).
Taos speakers have historically been reluctant to provide linguists with language data to work with and have preferred to keep their language secret from outsiders. G. Trager had to work with his consultants in private and keep their identities in confidence. The tendency for secrecy is a continuing general Pueblo reaction starting in the 17th century in large part due to the oppressive persecution (including public executions and torture) of Pueblo religious practices by the colonial Spanish. The Taos community has been particularly guarded about revealing their language (and culture) to outsiders when compared with other eastern pueblos in New Mexico. Due to secrecy practices, the details of language preservation are not known outside of the community.
Language variation
George L. Trager found no dialectal variation in the 1930 and 1940s.
Genealogical relations
Taos belongs to a northern sub-grouping on the Tiwa branch of the Tanoan language family. It is closely related to and partly mutually intelligible with Picurís (spoken at Picuris Pueblo). It is slightly more distantly related to Southern Tiwa (spoken at Isleta Pueblo and Sandia Pueblo).
History
In July 2012, Taos Pueblo, which "does not formally encourage persons outside the tribe to learn their language" hosted a Tiwa Language Festival for tribal members to keep Tiwa from "going to sleep". The Cultural Education Committee hopes to incorporate the Tiwa language into Head Start in the fall.
Phonology
According to one analysis, Taos has 18 consonants:
{|class="wikitable" style="text-align: center"
|-
! colspan="2" rowspan="2" |
! rowspan="2" | Bilabial
! colspan="2" | Dental
! rowspan="2" | Alveolar
! rowspan="2" | Palatal
! rowspan="2" | Velar
! rowspan="2" | Glottal
|-class=small !
! central
! lateral
|-
! rowspan="2" | |
https://en.wikipedia.org/wiki/Artificial%20intelligence%20marketing | Artificial intelligence marketing (AIM) is a form of marketing that leverages artificial intelligence concepts and models such as machine learning and Bayesian Networks to achieve marketing goals. The main difference between AIM and traditional forms of marketing resides in the reasoning, which is performed by a computer algorithm rather than a human.
Artificial Intelligence is used in various digital marketing spaces, such as content marketing, email marketing, online advertisement (in combination with machine learning), social media marketing, affiliate marketing, and beyond.
Behavioral targeting
Behavioral targeting refers to the act of reaching out to a prospect or customer with communication based on implicit or explicit behavior shown by the customer's past. Understanding of behaviors is facilitated by marketing technology platforms such as web analytics, mobile analytics, social media analytics, and trigger-based marketing platforms. Artificial Intelligence Marketing provides a set of tools and techniques that enable behavioral targeting.
Machine learning is used to improve the efficiency of behavioral targeting. Additionally, to prevent human bias in behavioral targeting at scale, artificial intelligence technologies are used. The most advanced form of behavioral targeting aided by artificial intelligence is called algorithmic marketing.
Collect, reason, act
Artificial intelligence marketing principles are based on the perception-reasoning-action cycle found in cognitive science. In the context of marketing, this cycle is adapted to form the collect, reason and act cycle.
Collect
This term relates to all activities which aim to capture customer or prospect data; for example on social media platforms, where the platform will measure the duration of time a post was viewed. Whether taken online or offline, this data is then saved into customer or prospect databases.
Reason
This is the stage where data is transformed into information and, eventually, intelligence or insight. This is the phase where artificial intelligence and machine learning in particular play a key role.
Act
With the intelligence gathered in the reason stage, one can then act. In the context of marketing, an act would be an attempt to influence a prospect or customer purchase decision using an incentive driven message.
In an unsupervised model, the machine in question would take the decision and act according to the information it received in the collect stage.
See also
Marketing and artificial intelligence
Targeted advertising
Online advertising
References
Further reading
Baesens Bart, Stijn Viaene, Dirk Van den Poel, Jan Vanthienen, and Guido Dedene. (2002), "Bayesian Neural Network Learning for Repeat Purchase Modelling in Direct Marketing", European Journal of Operational Research, 138 (1), 191–211.
Lou Hirsh (2002), "How Artificial Intelligence Decodes Customer Behavior", CRMDaily.com.
Yahoo Research Center Machine Learning.
Marketing and artificial int |
https://en.wikipedia.org/wiki/Shmuel%20Safra | Shmuel Safra () is an Israeli computer scientist. He is a Professor of Computer Science at Tel Aviv University, Israel. He was born in Jerusalem.
Safra's research areas include complexity theory and automata theory. His work in complexity theory includes the classification of approximation problems—showing them NP-hard even for weak factors of approximation—and the theory of probabilistically checkable proofs (PCP) and the PCP theorem, which gives stronger characterizations of the class NP, via a membership proof that can be verified reading only a constant number of its bits.
His work on automata theory investigates determinization and complementation of finite automata over infinite strings, in particular, the complexity of such translation for Büchi automata, Streett automata and Rabin automata.
In 2001, Safra won the Gödel Prize in theoretical computer science for his papers "Interactive Proofs and the Hardness of Approximating Cliques" and "Probabilistic Checking of Proofs: A New Characterization of NP".
See also
Bull graph
Set cover problem
Vertex cover problem
External links
Muli Safra's Homepage
Computational Complexity Theory Presentations
Gödel Prize laureates
Living people
Israeli computer scientists
Israeli Jews
People from Jerusalem
Academic staff of Tel Aviv University
Theoretical computer scientists
Weizmann Institute of Science alumni
1962 births |
https://en.wikipedia.org/wiki/Fit-PC | The fit-PC is a small, light, fan-less nettop computer manufactured by the Israeli company CompuLab.
Many fit-PC models are available. fit-PC 1.0 was introduced in July 2007, fit-PC Slim was introduced in September 2008, fit-PC 2 was introduced in May 2009, fit-PC 3 was introduced in early 2012, and fit-PC 4 was introduced spring 2014. The device is power-efficient (fit-PC 1 was about 5 W) and therefore considered to be a green computing project, capable of using open source software and creating minimal electronic waste.
Current models
fit-PC2
On February 19, 2009, Compulab announced the fit-PC2, which is "a major upgrade to the fit-PC product line".
Detailed specifications for the fit-PC2 include an Intel Atom Z5xx Silverthorne processor (1.1/1.6/2.0 GHz options), up to 2GB of RAM, 160GB SATA Hard Drive, GigaBit LAN and more. The fit-PC2 is also capable of HD video playback. Its declared power consumption is only 6W, and according to the manufacturer, it saves 96% of the power used by a standard desktop. fit-PC2 is the most power efficient PC on the Energy-Star list.
The fit-PC2 is based on the GMA 500 (Graphics Media Accelerator). Unfortunately the open source driver included in Linux kernel 2.6.39 does not support VA-API video or OpenGL/3D acceleration.
The fit-PC2 is being phased out and is being replaced by the fitlet, the fitlet was designed to replace the groundbreaking (and still popular) CompuLab fit-PC2.
fit-PC2i
On December 2, 2009, Compulab announced the fit-PC2i, a fit-PC2 variation targeting networking and industrial applications.
fit-PC2i adds a second Gbit Ethernet port, Wake-on-LAN, S/PDIF output and RS-232 port, has two fewer USB ports, and no IR.
fit-PC3
The fit-PC3 has been released early 2012.
See the fit-PC3 article.
fit-PC4
The fit-PC4 has been released spring 2014.
fitlet
The fitlet has been announced January 14, 2015.
It has 3 CPU/SoC variations, and 5 feature variations, though only 7 models have been announced so far.
Obsolete models
fit-PC Slim
On September 16, 2008, Compulab announced the Fit-PC Slim, which at 11 x 10 x 3 cm is smaller than fit-PC 1.0.
Hardware
fit-PC Slim uses 500 MHz AMD Geode LX800 processor and has 512mb soldered-on RAM. The computer includes a VGA output, a serial port with a custom connector, Ethernet, b/g WLAN, and 3 USB ports (2 on the front panel). The system has an upgradeable 2.5" 60GB ATA hard drive.
Software
fit-PC Slim has General Software BIOS supporting PXE and booting from a USB CDROM or USB thumb drive. It is pre-installed with either Windows Vista or with Ubuntu 8.10 and Gentoo Linux 2008.0 . Also Windows Embedded can be used, or pre-installed on a FlowDrive.
Availability
The fit-PC Slim end-of-life was announced on 19 June 2009 with the general availability of fit-PC2.
fit-PC 1.0
fit-PC 1.0 is an earlier model that has the following differences
Limited to 256mb RAM
No Wi-Fi
Dual 100BaseT Ethernet
Larger form factor - 12 x 11.6 x 4 cm
Only 2 USB ports
Hard disk |
https://en.wikipedia.org/wiki/Algorithmic%20mechanism%20design | Algorithmic mechanism design (AMD) lies at the intersection of economic game theory, optimization, and computer science. The prototypical problem in mechanism design is to design a system for multiple self-interested participants, such that the participants' self-interested actions at equilibrium lead to good system performance. Typical objectives studied include revenue maximization and social welfare maximization. Algorithmic mechanism design differs from classical economic mechanism design in several respects. It typically employs the analytic tools of theoretical computer science, such as worst case analysis and approximation ratios, in contrast to classical mechanism design in economics which often makes distributional assumptions about the agents. It also considers computational constraints to be of central importance: mechanisms that cannot be efficiently implemented in polynomial time are not considered to be viable solutions to a mechanism design problem. This often, for example, rules out the classic economic mechanism, the Vickrey–Clarke–Groves auction.
History
Noam Nisan and Amir Ronen first coined "Algorithmic mechanism design" in a research paper published in 1999.
See also
Algorithmic game theory
Computational social choice
Metagame
Incentive compatible
Vickrey–Clarke–Groves mechanism
References and notes
Further reading
.
Mechanism design
Algorithms |
https://en.wikipedia.org/wiki/Audata | Audata (Ancient Greek Αὐδάτη; ruled c. 359 – 336 BC) was an Illyrian princess and wife of Philip II of Macedon.
Biography
She was the daughter or granddaughter of the Illyrian king Bardyllis. In order to concentrate on the internal struggle necessary to secure his crown, Philip reaffirmed the treaty the Illyrians had imposed on Macedonia by force of arms and sealed the alliance with Bardyllis by his marriage of Audata. This action undoubtedly deterred a full-scale Illyrian invasion of Macedonia at a time when the country was most vulnerable. Philip immediately consolidated his power as a result, so much that he defeated Bardylis in a decisive battle in 358 BC.
Audata was the first or second wife of Philip and took the name Eurydice, the name of Philip's mother, after the wedding. This name change was probably due to dynastic reasons, because she was briefly the official queen of Philip. Calling her Eurydice could easily be a mistake of either Arrian or Photius, but it could also signify that Philip chose to change Audata's Illyrian name to something more Greek, or it could speak to his filial piety or simply to indicate that her status had changed. Soon after, Olympias became the main wife of Philip.
Her granddaughter was also named Eurydice. Audata probably lived into her daughter's teens and may still have been alive at the time of her daughter's marriage to Philip's nephew Amyntas IV. The assignment of the name Eurydice to Cleopatra, the niece of Attalus in 337/336 BC may suggest that Audata was no longer alive or at the court at that time, but Alexander the Great would certainly have encountered her in Pella as a child.
Notes
References
Illyrian royalty
Wives of Philip II of Macedon
Illyrian women
Ancient princesses |
https://en.wikipedia.org/wiki/PDBWiki | PDBWiki was a wiki that functioned as a user-contributed database of protein structure annotations, listing all the protein structures available in the Protein Data Bank (PDB). It ran on the MediaWiki wiki application from 2007 to 2013. The website went offline in 2014 and there has not been any way to subsequently access the information that was contributed. PDBWiki contained details of more than 50,000 protein structures and over 50 'user-contributed' annotations, making it a significant resource for the structural biology community.
Motivation
The Protein Data Bank (PDB) is the central archive of experimentally solved biomolecular structures. However, the PDB only allows data retrieval and does not provide functionality for collaboration or user feedback. In contrast, PDBWiki allows for sharing expert knowledge about structures deposited in the PDB. It provides tools for discussing and annotating proteins in a collaborative way. The goal is to create a central and freely-accessible repository of user-contributed information that will be useful for anyone working with PDB structures. As such PDBWiki can be considered a part of a wider effort in community-based biological databases curation.
About
PDBWiki was developed as part of the BioWiki initiative, and was entered into the third International Openfree Bioinformation Contents Competition organised by BiO.CC, a biological information website operated by KOBIC.
The Website went offline in January 2014, replaced with a notice redirecting to Proteopedia, a similar wiki-based structural biology database project.
See also
Proteopedia
The Molecular and Cellular Biology 'WikiProject'.
References
External links
The PDBWiki homepage
About PDBWiki
The Worldwide Protein Data Bank
Biological databases
MediaWiki websites |
https://en.wikipedia.org/wiki/Mac%20Alejandre | Mac C. Alejandre (born December 8, 1972) is a Filipino film and television director, as well as the head of The 5 Network's artist management division "Talent5" (a/k/a TV5 Talent Center).
Filmography
Television
Ikaw na Sana (1997–1998)
Click (1999)
Joyride (2004)
Darna (2005)
Majika (2006)
Now and Forever (2005–2006)
Muli (2007)
Sine Novela: Kung Mahawi Man ang Ulap (2007)
Asian Treasures (2007, assistant-director)
MariMar (2007–2008)
Joaquin Bordado (2008)
Totoy Bato (2009)
All My Life (2009)
The Last Prince (2010)
Endless Love (2010)
Amaya (2011–2012)
Nandito Ako (2012)
Never Say Goodbye (2013)
For Love or Money (2013–2014)
Film
Campus Girls (1995)
Okey si Ma'am (1995)
Habang May Buhay (1996)
Dahil Tanging Ikaw (1997)
Isang Tanong Isang Sagot (1997)
Wala Na Bang Pag Ibig? (1997)
Ikaw Na Sana (1998)
Ang Lahat ng Ito'y Para Sa'Yo (1998)
Ikaw Lamang (1999)
Sukdulan (2003)
Liberated (2003)
Captain Barbell (2003)
Singles (2004)
Liberated 2 (2004)
Lastikman (2004)
Let the Love Begin (2005)
Say That You Love Me (2005)
Hari ng Sablay (2005)
I Will Always Love You (2006)
One True Love (2008)
Ang Panday (2009)
In Your Eyes (2010)
Ang Panday 2(2011)
Just One Summer (2012)
The Annulment (2019)
Awards
References
External links
1972 births
Living people
Filipino film directors
Filipino screenwriters
Filipino television directors
GMA Network (company) people
TV5 Network people |
https://en.wikipedia.org/wiki/Muddle | Muddle may refer to:
Mr. Muddle, one of the Mr. Men from the children's book series by Richard Hargreaves
MDL (programming language), the Lisp-derived language that Zork was first written in
MUDDL, a programming language originally created for the first Multi-User Dungeon (MUD) by Richard Bartle and Roy Trubshaw
Mudlle, a programming language originally created for the MUD MUME by David Gay and Gustav Hållberg
Muddle (cricketer), an English cricketer for Kent, active 1768
See also
Muddler, a bartender's tool
Muddle Earth, a children's book by Paul Stewart
Muddle Earth (John Brunner)
Muddling spoon |
https://en.wikipedia.org/wiki/AVG%20Technologies | AVG Technologies is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast, a part of Gen Digital. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.
AVG was founded in 1990 in Czechoslovakia just as the country was transitioning from communism to capitalism. In the early 2000s, AVG expanded internationally and used money from venture capital investments to fund a series of acquisitions. AVG went public on the New York Stock Exchange in February 2012. Avast acquired AVG for $1.3 billion in July 2016.
History
AVG Technologies was founded by Tomáš Hofer and Jan Gritzbach in 1990 under the name Grisoft in Brno, Czechoslovakia. At the time, Czechoslovakia was starting to transition from communism to capitalism. Initially, Grisoft sold IT equipment and third-party software, in addition to its own antivirus product. Grisoft grew as the country loosened its international trade policies, so it could exchange technology with companies in Europe. By 1998, Grisoft had 13 employees.
Grisoft later expanded to the US market, creating an American company called AVG. Grisoft also expanded to the United Kingdom, the Netherlands, Germany, and other countries. For a time, the company was focused on bulk sales of antivirus software to computer manufacturers that sold PCs with Grisoft's software pre-installed. It started marketing software directly to consumers in 2006. In 2008, Grisoft changed the name of its parent company to AVG, the name already used for its software and for its American subsidiary. TA Associates invested an additional $200 million into the company that year for a minority stake in the business.
In 2001, Grisoft was sold to a venture capital firm Benson Oak Capital. The firm then sold a 65 percent interest in Grisoft to Intel Capital and Enterprise Investors for $52 million in 2005. The investments were used to fund a series of acquisitions. Grisoft bought spyware company Ewido Networks in 2006 and browser security company Exploit Prevention Labs in 2007. In 2009, AVG announced the acquisition of Sana Security, which analyzes software behavior. This was followed by the acquisition of mobile security startup DroidSecurity and iMedix Web Technologies in 2011, parental control software company Bsecure in 2012, and remote monitoring company Level Platforms in 2013.
AVG Technologies filed an initial public offering in February 2012. Additionally, former Mozilla CEO Gary Kovacs was appointed CEO of AVG. He led the effort to create a simple one-page privacy policy that discloses what data the company collects from users and what information about free users it sells to advertisers.
In 2014, AVG announced the acquisition of Location Labs, a cybersecurity company f |
https://en.wikipedia.org/wiki/PDVAL | Producción y Distribución Venezolana de Alimentos (PDVAL) is a nationwide food supply network in Venezuela. It was created by Venezuelan president Hugo Chávez and Petróleos de Venezuela (PDVSA) in response to the high food demand and presumed stockpiling by private food sectors, creating food shortage. Along with the related Mission Mercal, it was started following the Venezuelan general strike of 2002–2003, which saw concerns about corporate control of food distribution.
PDVAL's goal is to distribute basic goods such as meat, milk, chicken and other goods that have prices regulated by the government.
Controversies
From June 2010, PDVAL started being administrated by the Vicepresidency of Venezuela after the discovery of tons of decomposed food supplies around the country. Government opposition denounced the finding of thousands of containers with a total of 130.000 tons of decomposed supplies.
References
Agriculture companies of Venezuela
PDVSA
Venezuelan brands |
https://en.wikipedia.org/wiki/List%20of%20number-one%20Billboard%20Hot%20Latin%20Tracks%20of%201998 | This is a list containing the Billboard Hot Latin Tracks number-ones of 1998. Due to damage to the Broadcast Data Systems monitors in Puerto Rico caused by Hurricane Georges, no charts were published from October 10 to October 17.
See also
Billboard Hot Latin Tracks
References
1998 record charts
Lists of Billboard Hot Latin Songs number-one songs
1998 in Latin music |
https://en.wikipedia.org/wiki/Sense%20switch | A sense switch, or program switch, is a switch on the front panel of a computer whose state can be tested by conditional branch instructions in software. Most early computers had several sense switches. They were typically used by the operator to set program options.
On the IBM 1620 there are four switches, and their state can be tested via special forms of the IF-statement offered by the FORTRAN compiler for the IBM 1620. For the IBM 1130 there are sixteen switches matching the sixteen-bit word size of the computer, plus a toggle switch adjacent to the power on/off switch. These bit-switches are more normally used with the computer stopped to specify some memory address to be viewed (via the indicator lights on the front panel), or set. The state of these switches can be determined by a program, and so a running program might modify its behavior depending on the switches, such as change the amount of progress information printed, alter the tactics of a multi-variable optimization attempt, and so on. The IBM 1130 also has an "Interrupt Request" key associated with the console printer, whose pressing might cause a suitably programmed long-running program to type a progress report on the console printer. In the more usual batch job environment, it was pressed by the computer operator to signal the operating system to terminate a running program that had perhaps overrun its allowed time, or commenced misbehavior such as repeatedly printing blank lines.
The front panel of the Data General Eclipse computer has 5 sense switches, 16 address switches, and 5 control switches, as shown (left to right) in the figure at right.
Personal computers replace the function of fixed sense switches with the keyboard and screen user interface.
A typical running application has two modes: either it has nothing to do and awaits some user action, or, some action is in progress that will take a long time to complete. If a program does not regularly test the state of sense switches during a long calculation, they are ineffective at changing the program's operation.
References
Sense switch |
https://en.wikipedia.org/wiki/HPX | HPX, short for High Performance ParalleX, is a runtime system for high-performance computing. It is currently under active development by the STEAR group at Louisiana State University. Focused on scientific computing, it provides an alternative execution model to conventional approaches such as MPI. HPX aims to overcome the challenges MPI faces with increasing large supercomputers by using asynchronous communication between nodes and lightweight control objects instead of global barriers, allowing application developers to exploit fine-grained parallelism.
HPX is developed in idiomatic C++ and released as open source under the Boost Software License, which allows usage in commercial applications.
Applications
Though designed as a general-purpose environment for high-performance computing, HPX has primarily been used in
Astrophysics simulation, including the N-body problem, neutron star evolution, and the merging of stars
Octo-Tiger, An astrophysics application simulating the evolution of star systems.
LibGeoDecomp, A Library for Geometric Decomposition codes
Simulation crack and fractures utilizing Peridynamics
Phylanx, A Library for Distributed Array Processing
References
External links
HPX/STEAR Group Homepage
Latest HPX Documentation
HPX GitHub repository
STEAR Group Blog
STEAR Group Publications
Parallel computing
C++ libraries |
https://en.wikipedia.org/wiki/WXHC | WXHC (101.5 FM, "X101") is a radio station broadcasting a classic hits format. Licensed to Homer, New York, United States, the station is owned by Eves Broadcasting, Inc. and features programming from ABC News Radio, Premiere Networks, and United Stations Radio Networks.
References
External links
XHC
Radio stations established in 1991
1991 establishments in New York (state)
Classic hits radio stations in the United States |
https://en.wikipedia.org/wiki/Daily%20at%20Dawn | Daily at Dawn was an Australian sitcom that screened in 1981 on the Seven Network. The series was written and produced by Gary Reilly and Tony Sattler, the team behind other popular Australian comedy series such as Kingswood Country, Hey Dad..! and The Naked Vicar Show.
Synopsis
The series was set in the office of a metropolitan newspaper.
It was the first Australian comedy series to feature a regular gay character (Terry Bader as journalist Leslie).
Cast
Noeline Brown as Phil Maguire
Paul Chubb as Russell Ducke
Terry Bader as Leslie Windrush
Henri Szeps as Joe Parker
Julieanne Newbould as Kate Ashton
Robert Hughes as Gil James
Theo Stephens as Danny Mason
Vincent Gil
Maggie Dence
References
External links
Australian television sitcoms
Seven Network original programming
Australian television spin-offs
1981 Australian television series debuts
1981 Australian television series endings |
https://en.wikipedia.org/wiki/Greg%20Sansone | Greg Sansone is a Canadian sportscaster. He was an anchor and reporter for The Score and later became vice president of television for the network. He is currently the VP of programming and general manager of Sportsnet 360, the Canadian sports channel that replaced The Score, a position he has held since the new network's inception.
He was one of the first sports anchors to ever work for The Score. His debut was in April 1997, the same year The Score, then branded as Headline Sports made its debut across Canadian airwaves. Prior to joining The Score, he worked as a host at the Fan 590 from 1992 to 1997 and was an editorial assistant for Global Television's SportsLine from 1991 to 1992. He was the host of the popular program The Score Tonight with Martine Gaillard until 2004. Sansone was the co-host of Score on the NFL with Cam Stewart and was also guest host for Morency, a program that was hosted by Gabriel Morency on Hardcore Sports Radio.
He became vice president of The Score's programming and production in 2007, a title that would be changed to vice president of television operations.
References
Living people
Canadian television sportscasters
Canadian people of Italian descent
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Andrew%20Glassner | Andrew S. Glassner (born 1960) is an American expert in computer graphics, well known in computer graphics community as the originator and editor of the Graphics Gems series, An Introduction to Ray Tracing, and Principles of Digital Image Synthesis. His later interests include interactive fiction, writing and directing and consulting in computer game and online entertainment industries. He worked at the New York Institute of Technology Computer Graphics Lab.
He started working in 3D computer graphics in 1978. He earned his B.S. in computer engineering (1984) from Case Western Reserve University, Cleveland, Ohio, M.S. in computer science (1987) and Ph.D. (1988, advisor Frederick Brooks) from the University of North Carolina at Chapel Hill, Chapel Hill, NC.
He was a researcher in computer graphics with Xerox Palo Alto Research Center (1988–1994) and with Microsoft Research (1994–2000).
His other positions include founding editor of the Journal of Graphics Tools, founding member of the advisory board of Journal of Computer Graphics Techniques, and editor-in-chief of ACM Transactions on Graphics (1995–1997). He served as Papers Chair for SIGGRAPH '94.
Since 1996 he has been writing the Andrew Glassner's Notebook column in the IEEE Computer Graphics & Applications journal, collected into three books.
In 2018 he digitally published the book Deep Learning From Basics to Practice.
In July 2019, he took up a position as senior research scientist at visual effects company Weta Digital.
Bibliography
Deep Learning From Basics to Practice, Amazon Digital Services, 2018
Morphs, Mallards & Montagues, AK Peters Publishers, 2004,
Interactive Storytelling: Techniques for 21st Century Fiction, AK Peters Publishers, 2004,
Andrew Glassner's Third Notebook, AK Peters Publishers, 2004
Tomorrow's Stories: The Future of Interactive Entertainment, MIT Press, Cambridge, 2003
Andrew Glassner's Other Notebook, AK Peters Publishers, Natick, 2002
Andrew Glassner's Notebook, Morgan-Kaufmann Publishers, San Francisco, 1999
Principles of Digital Image Synthesis, Morgan-Kaufmann Publishers, San Francisco, 1995; author later (2011) released both volumes under Creative Commons license: Principles of Digital Image Synthesis, Version 1.01, January 19, 2011
(Series creator and editor) Graphics Gems, Academic Press, Cambridge (volumes I through V)
3D Computer Graphics: A Handbook for Artists and Designers, Design Press, New York, 1989 (Japanese translation 1990 by ASCII Press, Japan)
(editor) An Introduction to Ray Tracing, Academic Press, London, 1989 (creator, editor, and multiple contributor)
(Ph.D. thesis) Algorithms for Efficient Image Synthesis, 1988
Computer Graphics User's Guide, Howard W. Sams & Co., Indianapolis, 1984. (Japanese translation 1987 by ASCII Press, Japan)
References
External links
Real Time Rendering blog
1960 births
Living people
American computer scientists
Computer graphics professionals
University of North Carolina at Chapel Hill alu |
https://en.wikipedia.org/wiki/Gpm%20%28proteomics%29 | In proteomics, GPM stands for "Global Proteome Machine". It is a web-based, open source user interface for analyzing and displaying protein identification data. It was originally designed by Rob Craig and Ron Beavis and first released in 2003. The interface creates a series of web browser page views of tandem mass spectrometry data that has been assigned to protein sequences. The underlying data documents are stored in BIOML format files.
Since its original creation, GPM has been under continuous development. Major developments include the following:
Creation of GPMDB: a large proteomics database generated using GPM;
Inclusion in the Human proteome project as a data analysis and information resource;
Development of a REST API for GPMDB.
References
External links
GPM project website
Proteomics |
https://en.wikipedia.org/wiki/Dan%20Klein | Daniel Klein (born 1976) is an American computer scientist and professor of computer science at the University of California, Berkeley. His research focuses on natural language processing and artificial intelligence.
He was educated at Mt. Lebanon High School in Mt. Lebanon Township, Pennsylvania and earned a BA in mathematics, computer science, and linguistics by Cornell University (1998), a Master of Studies (MSt) in linguistics by Oxford University (1999) and a Ph.D. by Stanford University (2004), under Christopher Manning. He attended Oxford on a Marshall Scholarship. In addition to the Marshall scholarship, he has been awarded the ACM's Grace Murray Hopper Award, the Sloan Research Fellowship, the NSF CAREER Award, and the Microsoft New Faculty Fellowship.
References
American computer scientists
Grace Murray Hopper Award laureates
1976 births
Living people
UC Berkeley College of Engineering faculty
Alumni of the University of Oxford
Cornell University alumni
Computational linguistics researchers
Natural language processing researchers
Marshall Scholars |
https://en.wikipedia.org/wiki/Gigabit%20wireless | Gigabit wireless is the name given to wireless communication systems whose data transfer speeds reach or exceed one gigabit (one billion bits) per second. Such speeds are achieved with complex modulations of the signal, such as quadrature amplitude modulation (QAM) or signals spanning many frequencies. When a signal spans many frequencies, physicists refer that a wide bandwidth signal. In the communication industry, many wireless internet service providers and cell phone companies deploy wireless radio frequency antennas to backhaul core networks, connect businesses, and even individual residential homes.
Common frequencies and bands
In general, indoor protocols follow a cross-vendor standard and communicate in the unlicensed 2.4 GHz, 5 GHz, and (soon) 60 GHz bands.
The outdoor carrier link protocols vary widely and are not compatible across vendors (and often models from the same vendor).
Note: the higher bandwidth devices require a less complex modulation to achieve high speeds.
Wireless broadband
Internet service providers (ISP's) are looking for ways to expand gigabit per second (Gbit/s) high-speed services to their customers. These can be achieved through fiber to the premises broadband network architecture, or a more affordable alternative using fixed wireless in the last mile in combination with the fiber networks in the middle mile in order to reduce the costs of trenching fiber optic cables to the users. In the United States, 60 GHz V band is unlicensed. This makes the V band an appealing choice to be used as fixed wireless access for Gbit/s services to connect to homes and businesses. Similarly, 70/80 GHz E band is lightly licensed which can be more accessible to more providers to provide such services.
There had been some early adopters of the hybrid fiber-wireless approach to provide Gbit/s services to customers. One of those ISP's was Webpass, a company founded in 2003 in San Francisco as a wireless ISP focusing on buildings in big cities. Since then, Webpass had been increasing the speeds along with improved wireless technologies. By 2015, Webpass offered 1 Gbit/s connections to commercial customers, however, the residential customers were limited to speeds of up to 500 Mbit/s to share the 1 Gbit/s wireless link among many residents in the same building. The company utilized a combination of various licensed and unlicensed bands.
In January 2016, a startup company Starry from Boston introduced Starry Point with the goal to provide Gbit/s speed internet wirelessly to homes. The device is a fixed wireless unit attached to a window as an access point to connect to Starry core networks using a millimetre wave band communication. The company did not reveal the details of the band, but claimed to be "the world’s first millimeter wave band active phased array technology for consumer internet communications". However, in January 2018, at the time that the company announced the expansion of its beta service to cover 3 cities: Bost |
https://en.wikipedia.org/wiki/Josette%20Normandeau | Josette Normandeau or Josette D Normandeau is a Canadian television producer and martial artist. She is well known in martial arts circles for the documentary programming that she has produced on various styles of martial arts. Normandeau is president of the production company, Ideacom International Inc.
She has produced several television programs and starred in the documentary series Deadly Arts (shown on FitTV in the U.S.), in which she travels around the globe to different countries exploring the various indigenous martial arts. In the series, she is often given exclusive access to martial arts masters and their training schools.
Josette holds black belts in both Shotokan Karate and Aikido. Although fluent in English, French is her first language.
References
Year of birth missing (living people)
Canadian female karateka
Canadian aikidoka
Shotokan practitioners
French Quebecers
Living people |
https://en.wikipedia.org/wiki/Patient%20registration | Patient registration is used to correlate the reference position of a virtual 3D dataset gathered by computer medical imaging with the reference position of the patient. This procedure is crucial in computer assisted surgery, in order to insure the reproducitibility of the preoperative registration and the clinical situation during surgery.
The use of the term "patient registration" out of this context can lead to a confusion with the procedure of registering a patient into the files of a medical institution.
In computer assisted surgery, the first step is to gather a 3D dataset that reproduces with great accuracy the geometry of the normal and pathological tissues in the region that has to be operated on. This is mainly obtained by using CT or MRI scans of that region. The role of patient registration is to obtain a close-to-ideal reference reproducibility of the dataset – in order to correlate the position (offset) of the gathered dataset with the patient's position during the surgical intervention. Patient registration (1) eliminates the necessity of maintaining the same strict position of the patient during both preoperative scanning and surgery, and (2) provides the surgical robot the necessary reference information to act accurately on the patient, even if he has (been) moved during the intervention.
Application
Patient registration was used mostly in head surgery – oral and maxillofacial surgery, neurosurgery, otolaryngology. With the advent of marker- and markerless-registration, the concept has been extended for abdominal surgery.
Using headframes
The first attempts in 3D mapping of human tissues were made by V. Horsley and R. Clarke in 1906. They have built a rectangular stereotactic headframe that had to be fixed to the head. It was based on cartesian principles and allowed them to accurately and reproductibly guide needle-like electrodes for neurophysiological experiments. They have experimented animals and were able to contribute to the mapping of the cerebellum. Improved versions of the Horsley–Clarke apparatus are still in used today in experimental neurosurgery.
The first stereotactic device for humans was also developed in neurosurgery, by E. Spiegel and H. Wycis in 1947. It was used for surgical treatment of Parkinson's disease and, during time, its applicability was extended for the surgical treatment of tumors, vascular malformations, functional neurosurgery etc. The system was based both on headframes and X-ray images taken for all three planes of space.
Further development of stereotactic surgery was made by Brown, Roberts and Wells in 1980. They have developed a halo ring that was applied on the skull, during a CT scan and neurosurgical interventions. This method provided improved surgical guidance and was in fact the first development of computer guided surgery.
Patient registration for the head area has developed for nearly two decades on the same principle of combining CT scans with mechanical reference devices s |
https://en.wikipedia.org/wiki/Bennett%20Township%2C%20Fillmore%20County%2C%20Nebraska | Bennett Township is one of fifteen townships in Fillmore County, Nebraska, United States. The population was 66 at the 2020 census.
References
External links
City-Data.com
Townships in Fillmore County, Nebraska
Townships in Nebraska |
https://en.wikipedia.org/wiki/Applications%20of%20artificial%20intelligence | Artificial intelligence (AI) has been used in applications to alleviate certain problems throughout industry and academia. AI, like electricity or computers, is a general-purpose technology that has a multitude of applications. It has been used in fields of language translation, image recognition, credit scoring, e-commerce and other domains.
Internet and e-commerce
Recommendation systems
A recommendation system predicts the "rating" or "preference" a user would give to an item. Recommendation systems are used in a variety of areas, such as generating playlists for video and music services, product recommendations for online stores, or content recommendations for social media platforms and open web content recommendation.
Companies to use such systems include Netflix, Amazon and YouTube.
Web feeds and posts
Machine learning is also used in web feeds such as for determining which posts should show up in social media feeds. Various types of social media analysis also make use of machine learning and there is research into its use for (semi-)automated tagging/enhancement/correction of online misinformation and related filter bubbles.
Targeted advertising and increasing internet engagement
AI is used to target web advertisements to those most likely to click or engage in them. It is also used to increase time spent on a website by selecting attractive content for the viewer. It can predict or generalize the behavior of customers from their digital footprints. Both AdSense and Facebook use AI for advertising.
Online gambling companies use AI to improve customer targeting.
Personality computing AI models add psychological targeting to more traditional social demographics or behavioral targeting. AI has been used to customize shopping options and personalize offers.
Virtual assistants
Intelligent personal assistants use AI to understand many natural language requests in other ways than rudimentary commands. Common examples are Apple's Siri, Amazon's Alexa, and a more recent AI, ChatGPT by OpenAI.
Search engines
Search engines that use artificial intelligence include Google Search and Bing Chat.
Spam filtering
Machine learning can be used to fight against spam, scams, and phishing. It can scrutinize the contents of spam and phishing attacks to identify any malicious elements. Numerous models built on machine learning algorithms exhibit exceptional performance with accuracies over 90% in distinguishing between spam and legitimate emails.
Language translation
AI has been used to automatically translate spoken language and textual content, in products such as Microsoft Translator, Google Translate and DeepL Translator. Additionally, research and development are in progress to decode and conduct animal communication.
Facial recognition and image labeling
AI has been used in facial recognition systems, with a 99% accuracy rate. Some examples are Apple's Face ID and Android's Face Unlock, which are used to secure mobile devices.
Image |
https://en.wikipedia.org/wiki/Cold%20boot%20attack | In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) by performing a hard reset of the target machine. Typically, cold boot attacks are used for retrieving encryption keys from a running operating system for malicious or criminal investigative reasons. The attack relies on the data remanence property of DRAM and SRAM to retrieve memory contents that remain readable in the seconds to minutes following a power switch-off.
An attacker with physical access to a running computer typically executes a cold boot attack by cold-booting the machine and booting a lightweight operating system from a removable disk to dump the contents of pre-boot physical memory to a file. An attacker is then free to analyze the data dumped from memory to find sensitive data, such as the keys, using various forms of key finding attacks. Since cold boot attacks target random-access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective against this kind of attack. This is because the problem is fundamentally a hardware (insecure memory) and not a software issue. However, malicious access can be prevented by limiting physical access and using modern techniques to avoid storing sensitive data in random-access memory.
Technical details
DIMM memory modules gradually lose data over time as they lose power, but do not immediately lose all data when power is lost. With certain memory modules, the time window for an attack can be extended to hours or even a week by cooling them with freeze spray and liquid nitrogen. Furthermore, as the bits disappear in memory over time, they can be reconstructed, as they fade away in a predictable manner. Consequently, an attacker can perform a memory dump of its contents by executing a cold boot attack. The ability to execute the cold boot attack successfully varies considerably across different systems, types of memory, memory manufacturers and motherboard properties, and may be more difficult to carry out than software-based methods or a DMA attack. While the focus of current research is on disk encryption, any sensitive data held in memory is vulnerable to the attack.
Attackers execute cold boot attacks by forcefully and abruptly rebooting a target machine and then booting a pre-installed operating system from a USB flash drive, CD-ROM or over the network. In cases where it is not practical to hard reset the target machine, an attacker may alternatively physically remove the memory modules from the original system and quickly place them into a compatible machine under the attacker's control, which is then booted to access the memory. Further analysis can then be performed against the data dumped from RAM.
A similar kind of attack can also be used to extract data from memory, such as a DMA attack that allows |
https://en.wikipedia.org/wiki/Competitions%20and%20prizes%20in%20artificial%20intelligence | There are a number of competitions and prizes to promote research in artificial intelligence.
General machine intelligence
The David E. Rumelhart prize is an annual award for making a "significant contemporary contribution to the theoretical foundations of human cognition". The prize is $100,000.
The Human-Competitive Award is an annual challenge started in 2004 to reward results "competitive with the work of creative and inventive humans". The prize is $10,000. Entries are required to use evolutionary computing.
The Intel AI Global Impact Festival is an international annual competition held by Intel Corporation for school, and college students with prizes upwards of $15,000. It is about artificial intelligence technology. There are two age brackets in this competition, 13-18 Age Group, and 18 and Above Age Group.
The IJCAI Award for Research Excellence is a biannual award given at the IJCAI conference to researcher in artificial intelligence as a recognition of excellence of their career.
The 2011 Federal Virtual World Challenge, advertised by The White House and sponsored by the U.S. Army Research Laboratory's Simulation and Training Technology Center, held a competition offering a total of US$52,000 in cash prize awards for general artificial intelligence applications, including "adaptive learning systems, intelligent conversational bots, adaptive behavior (objects or processes)" and more.
The Machine Intelligence Prize is awarded annually by the British Computer Society for progress towards machine intelligence.
The Kaggle – "the world's largest community of data scientists compete to solve most valuable problems".
Conversational behaviour
The Loebner prize is an annual competition to determine the best Turing test competitors. The winner is the computer system that, in the judges' opinions, demonstrates the "most human" conversational behaviour, they have an additional prize for a system that in their opinion passes a Turing test. This second prize has not yet been awarded.
Automatic control
Pilotless aircraft
The International Aerial Robotics Competition is a long-running event begun in 1991 to advance the state of the art in fully autonomous air vehicles. This competition is restricted to university teams (although industry and governmental sponsorship of teams is allowed). Key to this event is the creation of flying robots which must complete complex missions without any human intervention. Successful entries are able to interpret their environment and make real-time decisions based only on a high-level mission directive (e.g., "find a particular target inside a building having certain characteristics which is among a group of buildings 3 kilometers from the aerial robot launch point"). In 2000, a $30,000 prize was awarded during the 3rd Mission (search and rescue), and in 2008, $80,000 in prize money was awarded at the conclusion of the 4th Mission (urban reconnaissance).
Driverless cars
The DARPA Grand Challenge is a |
https://en.wikipedia.org/wiki/Chudnovsky%20algorithm | The Chudnovsky algorithm is a fast method for calculating the digits of , based on Ramanujan's formulae. It was published by the Chudnovsky brothers in 1988.
It was used in the world record calculations of 2.7 trillion digits of in December 2009, 10 trillion digits in October 2011, 22.4 trillion digits in November 2016, 31.4 trillion digits in September 2018–January 2019, 50 trillion digits on January 29, 2020, 62.8 trillion digits on August 14, 2021, and 100 trillion digits on March 21, 2022.
Algorithm
The algorithm is based on the negated Heegner number , the j-function , and on the following rapidly convergent generalized hypergeometric series:A detailed proof of this formula can be found here:
This identity is similar to some of Ramanujan's formulas involving , and is an example of a Ramanujan–Sato series.
The time complexity of the algorithm is .
Optimizations
The optimization technique used for the world record computations is called binary splitting.
Binary splitting
A factor of can be taken out of the sum and simplified to
Let , and substitute that into the sum.
can be simplified to , so
from the original definition of , so
This definition of isn't defined for , so compute the first term of the sum and use the new definition of
Let and , so
Let and
can never be computed, so instead compute and as approaches , the approximation will get better.
From the original definition of ,
Recursively computing the functions
Consider a value such that
Base case for recursion
Consider
Python code
import decimal
def binary_split(a, b):
if b == a + 1:
Pab = -(6*a - 5)*(2*a - 1)*(6*a - 1)
Qab = 10939058860032000 * a**3
Rab = Pab * (545140134*a + 13591409)
else:
m = (a + b) // 2
Pam, Qam, Ram = binary_split(a, m)
Pmb, Qmb, Rmb = binary_split(m, b)
Pab = Pam * Pmb
Qab = Qam * Qmb
Rab = Qmb * Ram + Pam * Rmb
return Pab, Qab, Rab
def chudnovsky(n):
P1n, Q1n, R1n = binary_split(1, n)
return (426880 * decimal.Decimal(10005).sqrt() * Q1n) / (13591409*Q1n + R1n)
print(chudnovsky(2)) # 3.141592653589793238462643384
Notes
See also
Ramanujan–Sato series
Bailey–Borwein–Plouffe formula
Borwein's algorithm
Approximations of π
References
Pi algorithms |
https://en.wikipedia.org/wiki/Oracle%20Template%20Library | The Oracle, ODBC, and DB2 CLI Template Library (OTL) is a C++ library for database access, written by Sergei Kuchin. The OTL exists since 1996. It consists of a single header file. Besides Oracle, the OTL supports DB2 (natively), and various database systems now, directly or indirectly, via ODBC.
External links
C++ libraries |
https://en.wikipedia.org/wiki/8000%20series | 8000 series or 8000 class may refer to:
Computing and electronics
PC-8000 Series Japanese model of consumer personal computers
Radeon HD 8000 series graphics processing units manufactured by AMD
Nokia 8000 series cellphone
Train types
Fujikyu 8000 series electric multiple unit train
Hankyu 8000 series electric multiple unit train
Hanshin 8000 series electric multiple unit train
JR Shikoku 8000 series electric multiple unit train
Keihan 8000 series electric multiple unit train
Keio 8000 series electric multiple unit train
Kita-Osaka Kyuko 8000 series electric multiple unit train
Kobe New Transit 8000 series electric multiple unit train
Meitetsu KiHa 8000 series diesel multiple unit train
Nankai 8000 series electric multiple unit train
Odakyu 8000 series electric multiple unit train, operated by Odakyu Electric Railway
Sapporo Municipal Subway 8000 series subway cars
Shin-Keisei 8000 series electric multiple unit
Sotetsu 8000 series electric multiple unit
Tobu 8000 series electric multiple unit train
Tokyo Metro 8000 series electric multiple unit train
Tokyu 8000 series electric multiple unit train, operated by Tokyu Corporation
Korail Class 8000 electric locomotive class
PNR 8000 class diesel multiple unit train
Other uses
International 8000 series class 8 truck
See also
8000 (disambiguation) |
https://en.wikipedia.org/wiki/Social%20marketing%20intelligence | Social marketing intelligence is the method of extrapolating valuable information from social network interactions and data flows that can enable companies to launch new products and services into the market at greater speed and lower cost. This is an area of research however, companies using social marketing intelligence have achieved significant improvement in marketing campaigns.
Through social marketing intelligence, companies can identify people that are the most influential within their communities. These are the most connected people within any given social network. These people, sometimes called the alpha users or hubs as in small-world network theory, have considerable influence over the spread of information within their social network.
Alpha users
Alpha users are key elements of any social networks, who manage the connectivity of the core members of the community. Similar to how viruses spread in nature, there is an initial starting point to communications in social networks, and the originators of such communications are alpha users. They tend to be highly connected users with exceptional influence to the other thought-leaders of any social network.
Before digital communications, it was only possible to isolate the most influential members of any community by interviewing every member and tracing their full communication patterns within the social network. Traditional fixed landline telephone and internet use did not give enough accuracy to be able to pinpoint alpha users to a meaningful degree. With the advent of mobile phones, a personal digital communication channel was available to study.
Early research by mathematicians at Xtract in Finland produced models that suggested mobile networks could indeed track the full communication and isolate the alpha users. Since then, several companies including Xtract have launched commercial tools to detect alpha users, usually using mobile operator billing and telecoms traffic data.
Engagement marketing campaigns attempt to use alpha users as spokespersons in marketing and advertising. The idea is that consumers will trust more the opinion of their friend or known contact from a social network, than the random marketing and advertising messages of companies and brands. The desire is to achieve viral marketing effects by which the alpha users would spread the messages further.
Alpha users were first briefly discussed in public in the book 3G Marketing in 2004. The first industry article about alpha users was by Ahonen and Ahvenainen in Total Telecom in February 2005. The first telecoms conference where alpha user was explained was the 3G Mobile World Congress in Tokyo in January 2005.
The topic was part of the strategy keynote address at the 3GSM World Congress in Cannes in February 2005. The first book to discuss alpha users at length was Communities Dominate Brands in 2005.
See also
Engagement marketing
Influencer marketing
Marketing intelligence
Push poll
Social cloud computing
So |
https://en.wikipedia.org/wiki/Television%20in%20Brazil | Television in Brazil has grown significantly since the first broadcasts in 1950, becoming one of largest and most productive commercial television systems in the world. Its biggest network, TV Globo, is the second largest commercial network in South America, and is one of the largest television exporters around the world, particularly of telenovelas, having become popular in many countries. There are 14 free-to-air television networks, as well as satellite channels broadcasting throughout the country.
History
Early years
In 1939, Telefunken, a German manufacturing and electronics company, held the first television exhibition during the Sample Fair Expo in Germany. Then in July 1941, RCA and NBC debuted their first television station in New York, in what would become the very first commercial TV station in the world. The broadcast tower, installed at the top of the Empire State Building, allowed the station to broadcast on Channel 1 in the immediate vicinity of Manhattan in deference to FCC rules which allowed the earliest broadcasters to use Channel 1 on the VHF band for experimental commercial broadcasts. By 1946 shortly after World War II, in agreement with the US government and David Sarnoff's RCA, NBC switched its broadcast frequency to VHF channel 4, and the VHF transmission system was adopted in the US, operating 12 VHF channels from 2 to 13 by order of the FCC.
In Brazil around the same time, the concessions for the first television broadcast network were decreed and distributed by President Eurico Gaspar Dutra's administration, and a cornerstone was placed for the very first transmitter in Brazil for the first commercial network, Rede Tupi. It was initially located in the municipality of Morro do Pão de Açúcar, in the city of Rio de Janeiro. By 1949, a group of technicians and engineers arrived in Brazil and visited the planned location for the broadcast tower for the first time only to find that due to the topography in Rio, the planned broadcast tower site wouldn't be the ideal place for its installation. As media mogul Assis Chateaubriand was interested in the opening of the first broadcast television network in Brazil and Latin America and already knew that the US was crucial in sponsoring the first TV broadcast in Cuba on Christmas Day of 1950, he decided to transfer to São Paulo for the inaugural broadcast, and the government gave the concession of channel 3, given by Radio Difusora in order to start Rede Tupi's operations.
Then, Chateaubriand ordered the broadcasting equipment necessary, for the station had already been built, just in time for this installation. In July 1950, the equipment arrived by ship in Port Santos and was accompanied to the capital by one of the many artists of the Emissoras Associadas group in São Paulo via motorcade. The motorcade was a hit, and crowds gathered to see the equipment being driven to the new station, a preview of what the new station would offer.
Formation
The first broadcasts in Brazil |
https://en.wikipedia.org/wiki/Remo%20Ruffini | Remo Ruffini (born May 17, 1942, La Brigue, Alpes-Maritimes, at that time, Briga Marittima, Italy). He is the Director of ICRANet, International Centre for Relativistic Astrophysics Network and the President of the International Centre for Relativistic Astrophysics (ICRA). Ruffini initiated the International Relativistic Astrophysics PhD (IRAP PhD), a common graduate school program of several universities and research institutes for the education of theoretical astrophysicists. He is the Director of the Erasmus Mundus IRAP PhD program (IRAP Ph D Erasmus Mundus). He has been Professor of Theoretical Physics at the University of Rome "Sapienza" from 1978 to 2012.
Biography
After obtaining his degree in 1966 in Rome, he was a post-doctoral fellow at the Mainz Academy of Sciences working with Pascual Jordan, in West Germany. Then, he was a post-doctoral fellow with John Wheeler and Member of the Institute for Advanced Study in Princeton and later became an instructor and assistant professor at Princeton University. In 1975, he was a visiting professor at the Universities of Kyoto (Japan) and of Western Australia, Perth. In the years 1975–78, he worked with NASA, being a member of the task force on the scientific use of space stations. In 1976 he became professor of theoretical physics at the University of Catania and in 1978 he was appointed a professor at the University "Sapienza". In 1985, he was elected president of the International Center for Relativistic Astrophysics (ICRA). In 1984 he was a cofounder, with Abdus Salam, of the Marcel Grossmann Meetings. In 1987, he became co-chairman of the Italian-Korean Meetings on Relativistic Astrophysics. In the years 1989–93, he was President of the Scientific Committee of the Italian Space Agency. He is the editor of a variety of scientific journals. He is married to Anna Imponente and has a son, Iacopo.
His theoretical work led to the concept of boson stars. His classic article with John Wheeler popularized the astrophysical concept of Black Hole. With Demetrios Christodoulou he has given the formula for a Kerr-Newmann Black Hole endowed of charge, mass and angular momentum. His theoretical work led to the identification of the first Black Holes in the Milky Way Galaxy.
Together with his student C. Rhoades, he established the absolute upper limit to the mass of neutron stars. With his student Robert Leach, he used such an upper limit for fixing the paradigm which enabled the identification of the first Black Hole in the Milky Way Galaxy, Cygnus X1, using the splendid data of the Uhuru satellite by Riccardo Giacconi and his group.
For these works, Ruffini won the A. Cressy Morrison Award of the New York Academy of Sciences in 1972.
With his students Calzetti, Giavalisco, Song and Taraglio, Ruffini developed the role of fractal structures in cosmology.
Together with his collaborator Thibault Damour, Ruffini suggested the applicability of the Heisenberg-Euler-Schwinger process of pair creation in bl |
https://en.wikipedia.org/wiki/Local%20energy-based%20shape%20histogram | Local energy-based shape histogram (LESH) is a proposed image descriptor in computer vision. It can be used to get a description of the underlying shape. The LESH feature descriptor is built on local energy model of feature perception, see e.g. phase congruency for more details. It encodes the underlying shape by accumulating local energy of the underlying signal along several filter orientations, several local histograms from different parts of the image/patch are generated and concatenated together into a 128-dimensional compact spatial histogram. It is designed to be scale invariant. The LESH features can be used in applications like shape-based image retrieval, medical image processing, object detection, and pose estimation.
See also
Feature detection (computer vision)
Scale-invariant feature transform
Speeded up robust features
Gradient Location Orientation Histogram
References
Code:
Sarfraz, S., Hellwich, O.:"Head Pose Estimation in Face Recognition across Pose Scenarios", Proceedings of VISAPP 2008, Int. conference on Computer Vision Theory and Applications, Madeira, Portugal, pp. 235-242, January 2008 (Best Student Paper Award).
Feature detection (computer vision) |
https://en.wikipedia.org/wiki/VT%20100 | VT 100 may refer to
Vermont Route 100
VT100 terminal by Digital Equipment Corporation
the OlivePad VT100, a tablet computer |
https://en.wikipedia.org/wiki/Heartland%20Public%20Radio | Heartland Public Radio (HPR) is a non-commercial, listener-supported, non-profit radio network that broadcasts several Americana-formatted music feeds to a worldwide audience directly via the Internet and via affiliated terrestrial radio stations.
History
HPR was originally launched as a commercial Internet radio station in February 2004. It began operating under the name Heartland Public Radio on January 1, 2007, and that's when this commercial classic country station became known as "HPR1: The Classic Country Channel." On this date, Heartland Public Radio also launched a second live radio station known as "HPR2: The Western Music Channel."
On January 1, 2008, a third channel of non-commercial programming was launchedHPR3: The Bluegrass Channel.
On June 1, 2008, due to low ratings and listener support, HPR3: The Bluegrass Channel evolved into HPR3: The Bluegrass Gospel Channel and began featuring an all-Bluegrass Gospel format. Contributions from classic country and western music listeners to HPR1 and HPR2 were able to preserve existing programming on those two channels. Heartland Public Radio reported a 60% decline in listener contributions since the beginning of 2008probably due to a growing economic recession.
On January 1, 2009, HPR3 again switched formats and namesbecoming HPR3: The Alternative Country Channel. This new format focused on new and independent country music recordings that did not receive much, if any, airplay from commercial country radio stations.
On April 2, 2010, Heartland Public Radio rebranded "The Alternative Country Channel" as "Indie Country...Where Independent Country Lives!"
On July 1, 2010, Heartland Public Radio abruptly abandoned its Western Music format on Channel 2 flipping the station to a modernized rendition of its Channel 1 Classic Country format. HPR2 is now branded as "X Country...The Next Generation of Classic Country," and it features popular Classic Country music from the mid-1970s through the mid-1990s. HPR cited poor listener support for the Western Music format as the reason for the change in direction for Channel 2. Meanwhile, HPR1: The Classic Country Channel is now focusing on Traditional Classic Country music from the 1940s through the early 1970s.
In 2011, Heartland Public Radio rebranded "HPR2: X-Country" as "HPR2: Today's Classic Country".
On January 2, 2012, instead of shutting down a temporary fourth channel of music which was featuring Classic Country and Bluegrass Christmas Music for the holidays, Heartland Public Radio brought back Bluegrass Gospel music. "HPR4: Bluegrass Gospel"the second go-around for the genre on HPR has been a ratings success. Unfortunately, the reverse was true for "HPR3: Indie Country" later in 2012. On November 1, 2012, Heartland Public Radio brought back its annual Classic Country and Bluegrass Christmas Musicthis time displacing HPR3: Indie Country.
On January 2, 2013, HPR3 was shut down, leaving an gap in HPR's channel allotment.
Original programs
"T |
https://en.wikipedia.org/wiki/KQCV%20%28AM%29 | KQCV is a radio station on 800 kHz in Oklahoma City, Oklahoma. It is part of the Bott Radio Network of Christian radio stations and was the second station acquired by the network. Prior to that, it operated as a secular radio station from 1948 to 1976.
KQCV's transmitter is located off of County Line Road on the southwest edge of Oklahoma City; Bott Radio Network also maintains Oklahoma City offices at 1919 N. Broadway.
History
KTOW began broadcasting in 1948. It was owned by the Sooner Broadcasting Company; while KTOW itself was a daytime-only AM outlet, plans called for an FM station—the authorization for which would be surrendered because of the lack of sets in the area—and Sooner pursued television as well. An attempt to move to 1400 kHz, which would have allowed nighttime broadcasts, was denied in 1950. Sooner sold KTOW to Citizens Broadcasting Company of Oklahoma for $50,000 in 1955. Citizens moved KTOW to a newly converted building at the corner of NW 5th and Robinson streets in 1956; that facility stood until it was torn down in 1974 to build the Alfred P. Murrah Federal Building, being the last structure demolished to make way.
KTOW was sold to KTOW, Inc., in January 1959; the new owners suffered an immediate blow when the Mutual Broadcasting System, the network with which the station was affiliated, jumped from KTOW to KTOK, which boasted a 5,000-watt signal compared to KTOW's 250 watts. On March 1, 1960, KTOW became KJEM, promoting itself as broadcasting "the JEMs of Adult Music". April 9, 1961, brought KJEM-FM, a partial simulcast of the AM station's programming.
In 1964, the owners of KJEM bought KTOK for $625,000, selling KJEM-AM-FM for $315,000 to Radio Oklahoma, headed by the Globe Life and Accident Insurance Corporation. A 1966 blaze at the transmitter site briefly forced the station off the air; months after returning, it made an early move to an all-talk format, branded "Audience Involvement Radio".
1972 brought another sale, this time separating KJEM AM and FM. The buyer for 800 AM was a local electrical firm, Carroll Boyington and Son Electric, who paid $297,000; the call letters were changed to KLEC on September 19. KLEC aired a beautiful music format in its time with the call letters and had relocated to 1919 N. Broadway.
Carroll Boyington and Son Electric sold the station to Bott Broadcasting, Inc., of Kansas City for $284,000 in December 1975. New KQCV call letters, for "Quality Christian Voice", were instituted on January 19, 1976. KQCV was the second Bott station after KCCV in Kansas City.
Bott expanded in Oklahoma City when it acquired contemporary Christian outlet KNTL in 1994; Bott sold that station in 1997 and started noncommercial KQCV-FM.
FM translators
KQCV AM's programming is available on two FM translators in and near Oklahoma City and a third in El Reno.
References
External links
KQCV AM page on the Bott Radio Network website
FM translators
QCV (AM)
QCV
Bott Radio Network stations
1948 establishme |
https://en.wikipedia.org/wiki/Album%20Number%202 | Album #2 – also known as The Outsiders Album #2 or simply #2 – is the second studio album by the Outsiders.
Release data
The album was released in the LP format on Capitol in September 1966 in both monaural and stereophonic editions (catalogue numbers T 2568 and ST 2568, respectively).
Although never released individually as a CD, the band's first two albums were reissued on Liberty Bell as a "two-fer" CD, along with bonus tracks (catalogue number PCD 4365).
Notes on the tracks
Original LP
This LP is more of a "blue-eyed soul" album than Time Won't Let Me. Only one of the band's many singles is included, their second biggest seller "Respectable". Also known as "(She's So) Respectable" and "Respectable (What Kind of Girl Is This)", this song was written and released as a single by the Isley Brothers in 1959; though not a hit at that time, the song became more prominent when it was included on the Yardbirds' debut album, Five Live Yardbirds (1964). Its flip side, "Lost in My World" is an original song by the band (written by Tom King and Chet Kelley) and is a different song from the flip side of the 1970 single that was issued in the name the Outsiders and later re-credited to Climax. It closely emulates the band's first hit, "Time Won't Let Me"; both songs feature the same chord sequence, a similar main guitar theme, a highly disconnected vocal melody in the verses, verses which each begin with "I can't...", and a bridge section which has a guitar solo followed by a wordless vocal and a squealing horn crescendo.
"Since I Lost My Baby" was a Top 20 pop hit and a Top 5 R&B hit for the Temptations in mid-1965. The Tommy James and the Shondells version of "Hanky Panky" became a Number One hit in July 1966, shortly before the release of this album; when originally released by the Raindrops, it was a very different song with a slower and more sensual beat. "Cool Jerk" was a popular pop and R&B hit that was released by the Capitols in July 1966, again within weeks of the release of this album.
Another cover, "(Just Like) Romeo and Juliet" was a 1964 hit by the Reflections. One of the lesser known covers on the album, "Wine Wine Wine" was first recorded in 1959 by The Nightcaps.
CD bonus tracks
The first six bonus tracks are the sides from the last four singles by the band other than the two "B" sides that are included on Album #2; these songs are not included on any of the band's 1960s albums. The last two bonus tracks are alternate versions of two songs that are actually by Climax – Sonny Geraci's band after the Outsiders broke up – although "Think I'm Falling" was first released under the name the Outsiders before Tom King won the rights to the band name in a lawsuit. "Rock and Roll Heaven" went on to be a major hit song by the Righteous Brothers, but not until 1974.
Track listing
Side 1
"(Just Like) Romeo and Juliet" (Bob Hamilton, Freddie Gorman)
"Lost in My World" (Tom King, Chet Kelley)
"Since I Lost My Baby" (Smokey Robinson, Wa |
https://en.wikipedia.org/wiki/KYTT-FM | KYTT (K-Light 98.7 FM) is a Christian radio station licensed to Coos Bay, Oregon. The station is owned by Lighthouse Radio Group.
Programming
KYTT's programming primarily includes Contemporary Christian Music, with some Christian talk and teaching programs. Christian talk and teaching shows heard on KYTT include; Turning Point with David Jeremiah, Revive our Hearts with Nancy Leigh DeMoss, Focus On The Family, and Unshackled!.
History
The station began broadcasting November 19, 1978, and held the call sign KICR. The station originally broadcast at 98.3 MHz, and was owned by Intercontinental Ministries. The station aired a format consisting of religious programming, beautiful music, and classical music. In 1983, the station's call sign was changed to KYTT-FM. By 1984, the station was airing entirely religious programming. By 1985, the station's frequency had been changed to 98.7 MHz.
References
External links
KYTT's official website
YTT-FM
Coos Bay, Oregon
Radio stations established in 1978
1978 establishments in Oregon |
https://en.wikipedia.org/wiki/IT%20risk | Information technology risk, IT risk, IT-related risk, or cyber risk is any risk relating to information technology. While information has long been appreciated as a valuable and important asset, the rise of the knowledge economy and the Digital Revolution has led to organizations becoming increasingly dependent on information, information processing and especially IT. Various events or incidents that compromise IT in some way can therefore cause adverse impacts on the organization's business processes or mission, ranging from inconsequential to catastrophic in scale.
Assessing the probability or likelihood of various types of event/incident with their predicted impacts or consequences, should they occur, is a common way to assess and measure IT risks. Alternative methods of measuring IT risk typically involve assessing other contributory factors such as the threats, vulnerabilities, exposures, and asset values.
Definitions
ISO
IT risk: the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization. It is measured in terms of a combination of the probability of occurrence of an event and its consequence.
Committee on National Security Systems
The Committee on National Security Systems of United States of America defined risk in different documents:
From CNSS Instruction No. 4009 dated 26 April 2010 the basic and more technical focused definition:
Risk – Possibility that a particular threat will adversely impact an IS by exploiting a particular vulnerability.
National Security Telecommunications and Information Systems Security Instruction (NSTISSI) No. 1000, introduces a probability aspect, quite similar to NIST SP 800-30 one:
Risk – A combination of the likelihood that a threat will occur, the likelihood that a threat occurrence will result in an adverse impact, and the severity of the resulting impact
National Information Assurance Training and Education Center defines risk in the IT field as:
The loss potential that exists as the result of threat-vulnerability pairs. Reducing either the threat or the vulnerability reduces the risk.
The uncertainty of loss expressed in terms of probability of such loss.
The probability that a hostile entity will successfully exploit a particular telecommunications or COMSEC system for intelligence purposes; its factors are threat and vulnerability.
A combination of the likelihood that a threat shall occur, the likelihood that a threat occurrence shall result in an adverse impact, and the severity of the resulting adverse impact.
the probability that a particular threat will exploit a particular vulnerability of the system.
NIST
Many NIST publications define risk in IT context in different publications: FISMApedia term provide a list. Between them:
According to NIST SP 800-30:
Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that a |
https://en.wikipedia.org/wiki/SDSC | SDSC may refer to:
San Diego Supercomputer Center
Satish Dhawan Space Centre
Strategic and Defence Studies Centre
Secure Digital Standard Capacity card
São Carlos Airport (ICAO-Code) |
https://en.wikipedia.org/wiki/LisaProject | LisaProject was the first GUI-based project management software. Developed for the Apple Lisa computer, LisaProject was conceived and implemented by Debra Willrett of SoloSoft and developed for Apple's Lisa computer.
In 1981, Willrett realized that project management was a universal problem and that a GUI-based application would be a useful tool. She proposed what became LisaProject to Trip Hawkins at Apple. At the time, Apple was developing the Apple Lisa computer which had limited software.
LisaProject was the first project management system to simplify the project management process by allowing the user to interactively draw their project on the computer in the form of a PERT chart. Constraints could be entered for each task, and the relationships between tasks would show which ones had to be completed before a task could begin. Given the task constraints and relationships, a "critical path", schedule and budget could be calculated dynamically using heuristic methods. Once this was complete, the schedule data could be viewed as a Gantt chart.
Although the Lisa ultimately failed in the marketplace, its largest Lisa customer was NASA, which had used LisaProject for project management. In response to the demand for LisaProject from NASA and other customers, a new version called MacProject was made available with the first Macintosh release in 1984.
References
Classic Mac OS-only software made by Apple Inc.
Project management software
1981 software |
https://en.wikipedia.org/wiki/Symbolic%20trajectory%20evaluation | Symbolic trajectory evaluation (STE) is a lattice-based model checking technology that uses a form of symbolic simulation. STE is essentially used for computer hardware, that is circuit verification. The technique uses abstraction, meaning that details of the circuit behaviour are removed from the circuit model. It was first developed by Carl Seger and Randy Bryant in 1995 as an alternative to "classical" symbolic model checking.
References
C.-J. H. Seger, and R. E. Bryant, Formal Verification by Symbolic Evaluation of Ordered Trajectories, Formal Methods in System Design, Vol. 6, No. 2 (March, 1995), pp. 147–190
Model checking
Management cybernetics |
https://en.wikipedia.org/wiki/Libusb | libusb is a library that provides applications with access for controlling data transfer to and from USB devices on Unix and non-Unix systems, without the need for kernel-mode drivers.
Availability
libusb is currently available for Linux, the BSDs, Solaris, OS X, Windows, Android, and Haiku. It is written in C.
Amongst other applications, the library is used by SANE, the Linux scanner project, in preference to the kernel scanner module, which is restricted to Linux kernel 2.4.
See also
Linux API
udev
Video4Linux
References
External links
USB
C (programming language) libraries
Free computer libraries |
https://en.wikipedia.org/wiki/Xim%C3%A9nez | Ximénez or Ximenes may refer to:
Ximénez (surname), including a list of people with the name
Pedro Ximénez, a variety of grape grown in Spain and a type of sherry
Ximenes (crossword compiler), pseudonym of Derrick Somerset Macnutt
Ximenez-Fatio House, a historic property representing a boarding house from the Florida Territory period
See also
Jiménez (disambiguation), a variant of Ximénez
Giménez, a variant of Ximénez |
https://en.wikipedia.org/wiki/Go%3AAudio | Go:Audio are an English pop rock band from London, England. The band's sound implemented influences from pop punk and electropop, often using synthesizers and programming tools. They were also noted for not using a bassist and also supporting such bands as McFly, Scouting for Girls, hellogoodbye, Zebrahead and Bowling for Soup.
In 2008, they were nominated for "Best British Newcomer" at the Kerrang! Awards, which was won by Slaves to Gravity.
They released their debut extended play, Woodchuck, in March 2008 and along with the success of singles "Woodchuck" and "Made Up Stories", which made the UK Top 40, and She Left Me. They released their third single, "Drive to the City", on 20 April 2009. They released their first full-length album on 11 May 2009, titled Made Up Stories. On 26 November 2009, they announced on their MySpace blog that the band had split.
History
Formed in 2006, Go:Audio was signed to Epic Records in May 2007. Their promotional single, Woodchuck, was released to many radio and music television stations in late January the following year to promote the 4-track Woodchuck EP. It received heavy rotation, most notably from Kerrang! 105.2 which helped make the accompanying music video one of the most played on YouTube in the United Kingdom that month. The band's first official single, "Made Up Stories" was released on 26 May 2008 and the video, in which a hand-picked group of fans participated, was frequently shown on Kerrang!, Scuzz and Fizz TV (now known as Starz TV). Following the single's release, the band announced via their MySpace page that their debut album would carry the same title. Recording for the album took place in Sussex, England, and was completed by early June 2008 for a 25 August release. The album was leaked in late June 2008, and a decision was made to delay the release date until 19 January 2009. The second single from Made Up Stories was "She Left Me", released on 11 August, the first day of their UK headline tour. The band debuted an acoustic version of the track on 6 August on Rocklouder.co.uk. "She Left Me" peaked at No. 41 in the UK Singles Chart.
In 2007, Popjustice listed them in 'The Popjustice 10 Acts for 2007' at No. 4, with Mika at No. 5, and described Go:Audio as "Busted meets The Killers". Also on 16 April 2008, Popjustice named their single "Made Up Stories" as 'Song of the Day'.
In September 2008 the band left Epic Records citing no longer feeling they could move forward with them. On 10 January 2009, Go:Audio issued a blog entry via Myspace stating that they had postponed the release of their album to re-record certain songs that they were not entirely happy with, and to record a new single "Drive to the City" which would be included on the album. This third single was released on 20 April 2009, and was well-received, reaching number one on the MTV2 Music Chart. Go:Audio posted a blog on their Myspace asking fans to choose b-sides for this single, giving them four songs to choose from (high d |
https://en.wikipedia.org/wiki/National%20Company%20for%20Rail%20Transport | The National Rail Transportation Company (, abbreviated SNTF, ) is Algeria's national railway operator. The SNTF, a state-owned company, currently has a monopoly over Algeria's rail network of , although it is currently utilising only . Out of the total railway network, are ( of these are electrified) and are narrow gauge (as of 2008).
History
The beginnings
The history of the railway in Algeria began with the colonisation of the country by France. On 8 April 1857, a decree ordered the creation of of railways, beginning with the construction of a standard gauge line from Algiers to Blida, which started on 12 December 1859. The French private company Compagnie des chemins de fer algériens started working on the line with the help of the French army on 11 July 1860. Around the same time, the company obtained permission to create an Oran-Sig line and a Constantine-Skikda line. However, due to economic difficulties, only the Algiers-Blida line was finished, and it was subsequently opened to the public on 8 September 1862. Afterwards, 5 other companies started the construction of new lines:
La Compagnie Bône - Guelma (BG)
La Compagnie de l'Est Algérien (EA) (Eastern Algeria)
La Compagnie Paris - Lyon - Méditerranée (PLM)
La Compagnie de l'Ouest Algérien (OA) (Western Algeria)
La Compagnie Franco - Algérienne (FA)
Between 1857 and 1878, the following lines (or parts of them) were finished, totalling , which exceeded initial expectations:
Annaba - Berrahal
Annaba - Bouchegouf - Guelma
El Khroub - Oued Zenati
Constantine - Skikda
Constantine - Sétif
Algiers - Thénia
Algiers - Oran
Arzew - La Macta - Mohammedia
Mohammadia - Mécheria
Oued Tlélat-Sidi Bel Abbès
Nationalisation
After 1879, France divided the railway lines being built into categories of local interest or of general interest, with only the latter being eligible to receive state funding. The 18 July 1879 decree defined the extent of some "general interest" lines and ordered the construction of a further of railways to expand the existing network. Between 1879 and 1906, the following lines (or parts of them) were finished, totalling :
Souk Ahras—Tébessa—Le Kouif—Tunisian border
Berrahal—Ramdane Djamel
Ouled Rahmoune—Khenchela
El Guerrah—Biskra
Sétif—Thénia with further lines to include Tizi Ouzou, Béjaia and Sour El-Ghozlane
Blida—Berrouaghia
Mostaganem—Relizane—Tiaret
Oran—Arzew
Es Sénia—Aïn Témouchent
Sidi Bel Abbès—Tlemcen—Moroccan border
Tabia—Crampel
Méchéria—Béchar
Tizi—Mascara
In 1946, Algeria's total railway network comprised a total of of active lines, in addition to mine lines, significantly more than the current network. After a while, the private companies were unable to maintain economic stability, which led the French government to buy the Franco - Algérienne, Est Algérien, Bône-Guelma and Ouest Algérien in 1900, 1908, 1905 and 1920 respectively.
On 27 September 1912, the state-owned Compagnie des Chemins de Fer Algériens de l'Etat (CFAE) assumed control of all lin |
https://en.wikipedia.org/wiki/Culture%20Kult%C3%BCr | Culture Kultür is a Spanish electronic music project, working primarily in the EBM and synthpop genres.
History
Culture Kultür are frontman Salva Maine, Josua at the programming and Distortiongirl as live keyboardist. The band was born in 1992 in Málaga, Southern Spain, evolving from a 80s alike EBM with distorted voices to a more electro sound with energetic beats, melodic synths and meaningful lyrics boosted by powerful vocals.
After their signing with Out of Line in 1999 they have supported the Mexican band Hocico in the Tierra Electrica '99 Tour, played in mayor festivals as WGT, M'era Luna, Infest & Eurorock, performing gigs in USA, Mexico and Canada, and included dozens of songs in different compilations.
Their EP "DNA Slaves" reached the 10th position in DAC charts (German alternative charts), and their second album, Revenge, contains hits that have been spun all over the world, becoming a club classic.
The band released the album Reborn in June 2005; it reached position 3 at the DAC charts.
They released the album Spirit in 2010. On 21 January 2019 Culture Kultür released their fifth studio album Humanity.
Discography
Albums
Bump! CD (Microscopic, 1998)
Reflex CD (Out Of Line, 1999)
Revenge CD (Out Of Line, 2001)
Reborn CD (Out Of Line, 2005)
Spirit CD (Caustic Records, 2010)
Humanity CD (Caustic Records, 2019)
EPs
Bass...Can You Hear Me? (1992)
F.T.W. EP (1993)
Spike (Microscopic, 1996)
Rev.-Time EP (Microscopic, 1996)
Default (Microscopic, 1997)
Aftermath (Microscopic, 1998)
Manifesto EP (Out Of Line, 1999)
DNA Slaves EP (Out Of Line, 1999)
Combat EP (Out Of Line, 2002)
Synthpop groups |
https://en.wikipedia.org/wiki/So%20You%20Think%20You%20Can%20Dance%20%28American%20season%204%29 | So You Think You Can Dance is a United States television reality program and dance competition airing on the Fox Broadcasting Company network. Season four premiered on May 22, 2008, with Nigel Lythgoe and Mary Murphy returning as permanent judges and Cat Deeley returning to host. Joshua Allen was announced as the winner on August 7, 2008, the first hip-hop dancer to win the title.
Auditions
Open auditions for this season were expanded to the following six cities:
For the first time, New York City was not a stop on the audition tour.
To be able to audition, contestants had to be between the ages of 18 and 30 and able to be legally employed in the United States. Partner auditions were allowed.
Las Vegas week
Over 200 contestants who impressed the judges in the initial auditions each received a plane ticket to a challenging week of callback auditions at the Planet Hollywood Resort and Casino in Las Vegas, Nevada. The week consisted of multiple rounds of choreography, with dancers cut from the competition every round. This season, the rounds included a hip-hop routine with Napoleon D'umo and Tabitha D'umo, a Broadway number with Tyce Diorio, the foxtrot with Jean-Marc Généreux, group choreography, contemporary choreography with Mia Michaels, and a final solo for the remaining contestants. Nigel Lythgoe and Mary Murphy were part of the judging panel for the week, along with Debbie Allen, Mia Michaels, Napoleon D'umo and Tabitha D'umo.
Finals
Format
As in seasons 2 and 3, the finals began with 20 contestants, ten male and ten female. After partners are assigned, couples pick a dance style out of a hat, are rehearsed by a choreographer, and perform their routine. Following the airing of the performances, home viewers vote for their favorite couple. The bottom three couples (six dancers overall) are then liable for elimination by the judges on the live, or broadcast on Broadcast delay in the western United States, results show. All six dancers perform a solo, after which the judges eliminate one male and one female contestant. If the eliminated dancers are not from the same couple, their respective partners form a new pair for the following week's performances. Once the field of dancers is narrowed down to the top 10, permanent partnerships dissolve and contestants draw their new partners from a hat each week. The judges no longer have any say in the elimination process; viewers call in to vote for their favorite individual dancer, and the male and female with the lowest number of votes are eliminated each week.
Because of the inclusion of performer William Wingfield into the top 20 dancers, Debbie Allen was ruled ineligible to perform duties as a Guest Judge during the Finals phase, as long as Wingfield remained in the competition. Wingfield is a Contemporary dancer from Nashville, Tennessee who trained under Allen at the Debbie Allen Dance Academy. He was voted off the competition on July 24, 2008. Because of Wingfield being eliminated, Debbie A |
https://en.wikipedia.org/wiki/Social%20network%20analysis%20software | Social network analysis (SNA) software is software which facilitates quantitative or qualitative analysis of social networks, by describing features of a network either through numerical or visual representation.
Overview
Networks can consist of anything from families, project teams, classrooms, sports teams, legislatures, nation-states, disease vectors, membership on networking websites like Twitter or Facebook, or even the Internet. Networks can consist of direct linkages between nodes or indirect linkages based upon shared attributes, shared attendance at events, or common affiliations. Network features can be at the level of individual nodes, dyads, triads, ties and/or edges, or the entire network. For example, node-level features can include network phenomena such as betweenness and centrality, or individual attributes such as age, sex, or income. SNA software generates these features from raw network data formatted in an edgelist, adjacency list, or adjacency matrix (also called sociomatrix), often combined with (individual/node-level) attribute data. Though the majority of network analysis software uses a plain text ASCII data format, some software packages contain the capability to utilize relational databases to import and/or store network features.
Features
Visual representations of social networks are important to understand network data and convey the result of the analysis. Visualization often also facilitates qualitative interpretation of network data. With respect to visualization, network analysis tools are used to change the layout, colors, size and other properties of the network representation.
Some SNA software can perform predictive analysis. This includes using network phenomena such as a tie to predict individual level outcomes (often called peer influence or contagion modeling), using individual-level phenomena to predict network outcomes such as the formation of a tie/edge (often called homophily models) or particular type of triad, or using network phenomena to predict other network phenomena, such as using a triad formation at time 0 to predict tie formation at time 1.
Collection of social network analysis tools and libraries
See also
Comparison of research networking tools and research profiling systems
Social network
Social network analysis
Social networking
Organizational Network Analysis
References
Notes
Barnes, J. A. "Class and Committees in a Norwegian Island Parish", Human Relations 7:39-58
Borgatti, S. (2002). NetDraw Software for Network Visualization. Lexington, KY: Analytic Technologies.
Borgatti, S. E. (2002). Ucinet for Windows: Software for Social Network Analysis. Harvard, MA: Analytic Technologies.
Berkowitz, S. D. 1982. An Introduction to Structural Analysis: The Network Approach to Social Research. Toronto: Butterworth.
Brandes, Ulrik, and Thomas Erlebach (Eds.). 2005. Network Analysis: Methodological Foundations Berlin, Heidelberg: Springer-Verlag.
Breiger, Ronald L. 2004. "The Analy |
https://en.wikipedia.org/wiki/TBR | TBR may refer to:
Tampa Bay Rays, a Major League Baseball team
Tampa Bay Rowdies, a USL Championship soccer club
Tree bisection and reconnection, a tree rearrangement algorithm in computational phylogenetics
TBR, IATA code for Statesboro-Bulloch County Airport
TBR1 (T-box, brain, 1), a transcription factor protein
Teenage Bottlerocket, a punk rock band from Laramie, Wyoming
Tennessee Board of Regents, a public university system
This Beautiful Republic, a Christian rock band from Toledo, Ohio
Tick-borne rickettsiosis
Tommy Baldwin Racing, a NASCAR race team
Torpedo bomber reconnaissance
Tracheobronchial rupture, a type of tracheobronchial injury
Tracy Beaker Returns, a 2010 CBBC show
Trickle-bed reactor, a chemical reactor |
https://en.wikipedia.org/wiki/STAT5B | Signal transducer and activator of transcription 5B is a protein that in humans is encoded by the STAT5B gene. STAT5B orthologs have been identified in most placentals for which complete genome data are available.
Function
The protein encoded by this gene is a member of the STAT family of transcription factors. In response to cytokines and growth factors, STAT family members are phosphorylated by the receptor associated kinases, and then form homo- or heterodimers that translocate to the cell nucleus where they act as transcription activators. This protein mediates the signal transduction triggered by various cell ligands, such as IL2, IL4, CSF1, and different growth hormones. It has been shown to be involved in diverse biological processes, such as TCR signaling, apoptosis, adult mammary gland development, and sexual dimorphism of liver gene expression. This gene was found to fuse to retinoic acid receptor-alpha (RARA) gene in a small subset of acute promyelocytic leukemias (APML). The dysregulation of the signaling pathways mediated by this protein may be the cause of the APML.
Interactions
STAT5B has been shown to interact with:
Glucocorticoid receptor,
Janus kinase 1,
Janus kinase 2, and
PTPN11.
See also
STAT5
References
Further reading |
https://en.wikipedia.org/wiki/GVR | GVR may refer to:
People
A Royal cypher
George V of the United Kingdom (GVR), whose Royal cipher was "George V Rex"
Guido van Rossum (GvR), computer programmer known for creating the Python programming language
Guido van Robot (GvR), a learning tool for the Python programming language
G. Vijayaraghavan (personal website gvr.co.in) Indian cardiologist
Transportation
Glenbrook Vintage Railway, in New Zealand
Grand Valley Railway, in the western United States
Gwendraeth Valley Railway, in Wales; a component of the Burry Port and Gwendraeth Valley Railway
Goresuar train station (rail code: GVR), see List of railway stations in India
Governador Valadares Airport (IATA airport code: GVR; ICAO airport code: SBGV;), in Brazil
Other uses
Green Valley Ranch, resort near Las Vegas
Gurung language (ISO 639 language code: gvr)
Grant, vacate, remand order, an order issued by the U.S. Supreme Court to grant a writ of certiorari for the sole purpose of vacating the judgment below and remanding it to the court below for further consideration.
See also
George V (disambiguation) |
https://en.wikipedia.org/wiki/KDAZ | KDAZ (700 AM) is a commercial radio station in Albuquerque, New Mexico. It airs a combination of syndicated talk radio shows and Christian radio programming. It is owned by Pan American Broadcasting Co., Inc.
Weekdays, most of the shows heard on KDAZ are conservative talk programs: Markley, Van Camp and Robbins, The Joe Pags Show, The Lars Larson Show and Jay Sekulow. Hourly newscasts are from Salem's Townhall Radio News. Christian programming is heard late nights and weekends, along with syndicated shows from Howie Carr and Todd Starnes.
KDAZ is a Class D radio station. By day, it broadcasts at 450 watts. AM 700 is a clear-channel frequency in the United States, reserved for Class A station WLW in Cincinnati. So at night, KDAZ reduces power to 55 watts to avoid interference. Programming is also heard on FM translator K245CD at 96.9 MHz in Albuquerque.
History
Early Years
The station first signed on as KMGM in . It changed its call sign to KVOD in 1962 and to its current call letters KDAZ in 1969. It originally broadcast on 730 AM. Its power was 1,000 watts by day and only 79 watts at night. It needed a complicated directional antenna to prevent it from interfering with other stations on 730 AM.
For most of its early years, it broadcast Christian radio shows day and night. KDAZ was acquired by its current owner, Pan American Broadcasting, on November 17, 2003.
In 2021, KDAZ moved down the AM dial to 700 AM. The new frequency allowed it to operate with a non-directional antenna using a single tower.
FM and TV simulcast
In February 2016, a construction permit was granted by the Federal Communications Commission to move FM translator station K230BB from Fowler, Colorado, into the Albuquerque radio market on 96.9 MHz. It would simulcast KDAZ on the FM band at 70 watts from atop Sandia Crest. The translator was licensed on October 13, 2016 as K245CD. However it had not begun broadcasting until early 2017. In December 2016, Pan American Broadcasting purchased the translator from Mountain Community Translators for $30,000. The power was upgraded from 70 watts to 160 watts in early March 2017.
KDAZ can also be heard on the Sky Angel television programming service, located on channel 9773 over satellite and channel 229 over IPTV. Audio can also be heard on television stations KCHF channel 11.5 in Santa Fe and KNMQ-LD channel 43.6 in Albuquerque.
References
External links
Sky Angel
FCC History Cards for KDAZ
DAZ
DAZ
Radio stations established in 1960
1960 establishments in New Mexico
Moody Radio affiliate stations |
https://en.wikipedia.org/wiki/Mona%20Leaves-a | "Mona Leaves-a" is the nineteenth and penultimate episode of the nineteenth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on May 11, 2008. The episode features the death of Homer's mother, Mona Simpson. Homer is reunited with his mother, Mona, but is not willing to forgive her for all the times she left him as a child. When she dies, a guilt-ridden Homer attempts to make it up to her by fulfilling her final wishes. It was written by Joel H. Cohen and directed by Mike B. Anderson and Ralph Sosa. Glenn Close makes her third appearance as Mona Simpson, and Lance Armstrong has a cameo as himself.
The episode is dedicated to the memories of Elsie Castellaneta (Dan Castellaneta's mother) and Dora K. Warren (Harry Shearer's mother). This episode also marked the start of yearly episodes to deal with women or mothers while airing on Mother's Day.
In its original run, the episode was watched by 6.02 million people.
Plot
As the Simpson family arrive home from their trip to the Springfield mall, they find their door is open, suggesting a burglar is inside the house. Bart fetches Homer a makeshift weapon made from a cinder block tied to a chain that he calls "The Defender". Homer swings it around to threaten the burglar, but when the family smells apple pie, they discover it is actually Homer's mother, Mona Simpson. Mona says that her days of activism are over, and that she is staying for good. Homer explains that he feels hurt and abandoned when Mona is not around, and does not want to feel that way again. Mona tries to explain to Homer she has changed her ways, but, again Homer does not listen.
Later that night, Mona asks if Homer will forgive her, a shaken Homer angrily replies that he will not, because of all the times she left him. Afterwards, Homer realizes he should have listened to his mother, and makes her a card as an apology. But when he goes downstairs to apologize, he sees her sitting in front of the fire, and asks if she is asleep. When he then notices and questions that she is "sleeping with her eyes open", her head slumps down and Homer realizes that she has died.
As Mona is cremated, Homer is depressed and guilt-ridden for not apologizing to his mother and struggles to come to terms with her death, especially since he blames himself for her passing. While shopping at the Kwik-E-Mart, he asks Apu what happens when people die. Apu believes that Homer's mother may have been reincarnated, but Ned, being Christian, doesn't buy into it and says to Homer that no one returns as anything from the hereafter. Eventually, the family finds and watches a video will from Mona. They discover that Mona left the family some of her possessions: Marge receives Mona's hemp sulfur purse, Bart receives Mona's Swiss Army knife, and Lisa receives Mona's rebellious spirit. For Homer, however, she leaves a task: to take her ashes to the highest point at Springfield Monument Park and sc |
https://en.wikipedia.org/wiki/The%20Casket | The Casket is a weekly newspaper published in Antigonish, Nova Scotia, Canada, by SaltWire Network.
History
First published on June 24, 1852 by John Boyd, the paper was eventually acquired by Casket Printing and Publishing Company.
Brace Publishing Limited, a division of the Halifax newspaper The Chronicle Herald, acquired the newspaper in 2012 before being subsumed into the Chronicle Herald's expanded SaltWire Network in 2017.
Staff have included the noted cartoonist, Bruce MacKinnon, who worked for the paper as a youth.
References
Weekly newspapers published in Nova Scotia
Antigonish, Nova Scotia
1852 establishments in the British Empire
SaltWire Network publications
Canadian Gaelic
Newspapers established in 1852 |
https://en.wikipedia.org/wiki/Chandu%20the%20Magician | Chandu the Magician is an American supernatural radio drama which originally aired from 1931–1936. A revival on a different network took place 12 years later, airing from 1948–1950. The series was created by Harry A. Earnshaw (1878–1953) and Raymond R. Morgan. The two series portrayed the adventures of Frank Chandler, also known as Chandu, an American who had learned mystical arts, such as astral projection, which he used to fight criminals and villains, including the evil Baron Roxor. Chandu was Steve Ditko's and Stan Lee's inspiration for the more famous Marvel Comics character Doctor Strange.
Radio version
The original version
Launched in 1931 on KHJ in Los Angeles, the series was soon heard through the West Coast when broadcast on the Don Lee Network. It was then heard, starting in February 1932, over WOR in the East. Nationally, it aired over the Mutual Network beginning on October 8, 1932. The series was sponsored by White King Soap in the West and by Beech Nut Gum in the East.
Gayne Whitman played the lead role of American-born Frank Chandler, who had learned occult secrets from a yogi in India. Known as Chandu, he possessed several supernatural skills, including astral projection, teleportation and the ability to create illusions. Chandu's goal was to "go forth with his youth and strength to conquer the evil that threatens mankind". His sister, Dorothy Regent, was portrayed by Margaret MacDonald.
Cyril Armbrister directed the scripts by Vera Oldham which took Chandu to far-flung locales, both real and mythical. Romantic interludes for Chandu were introduced with Egyptian Princess Nadji (Veola Vonn). Music was first furnished by Felix Mills and then Raymond Paige. According to Veola Vonn, the program was broadcast from the KHJ building on Melrose Avenue; the KHJ building is still standing, although the KHJ studios are no longer in use.
In 1932, Walter Winchell noted: "One of the smaller radio chains has a feature called Chandu, which is Hindu-Chinese for an opium preparation. In fewer wordsdope".
In 1935, the production moved to WGN Chicago with a new cast, including Howard Hoffman in the title role and Cornelia Osgood as Dorothy. Her children, Bob and Betty, were played by Olan Soule and Audrey McGrath. When this series came to an end in 1936, WGN's productions of Chandu were transcribed in the Chicago facilities of the World Broadcasting System for use on other stations. In April 1935, they were being broadcast on one other station, WJR in Detroit, Mich.
Revival
Twelve years later, the series was revived on the Mutual–Don Lee Network on June 28, 1948, as a 15-minute weekday program starring Tom Collins as Chandu and Luis van Rooten as the villainous Roxor, plotting world domination. With Howard Culver as the announcer and music by organist Korla Pandit, that series continued until January 28, 1949. The serial continuity was dropped on February 2, 1949 in favor of 30-minute episodes, each with a self-contained storyline, continuin |
https://en.wikipedia.org/wiki/Fingerprint%20%28computing%29 | In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely identify people for practical purposes. This fingerprint may be used for data deduplication purposes. This is also referred to as file fingerprinting, data fingerprinting, or structured data fingerprinting.
Fingerprints are typically used to avoid the comparison and transmission of bulky data. For instance, a web browser or proxy server can efficiently check whether a remote file has been modified, by fetching only its fingerprint and comparing it with that of the previously fetched copy.
Fingerprint functions may be seen as high-performance hash functions used to uniquely identify substantial blocks of data where cryptographic hash functions may be unnecessary.
Special algorithms exist for audio fingerprinting and video fingerprinting.
Properties
Virtual uniqueness
To serve its intended purposes, a fingerprinting algorithm must be able to capture the identity of a file with virtual certainty. In other words, the probability of a collision — two files yielding the same fingerprint — must be negligible, compared to the probability of other unavoidable causes of fatal errors (such as the system being destroyed by war or by a meteorite): say, 10−20 or less.
This requirement is somewhat similar to that of a checksum function, but is much more stringent. To detect accidental data corruption or transmission errors, it is sufficient that the checksums of the original file and any corrupted version will differ with near certainty, given some statistical model for the errors. In typical situations, this goal is easily achieved with 16- or 32-bit checksums. In contrast, file fingerprints need to be at least 64-bit long to guarantee virtual uniqueness in large file systems (see birthday attack).
When proving the above requirement, one must take into account that files are generated by highly non-random processes that create complicated dependencies among files. For instance, in a typical business network, one usually finds many pairs or clusters of documents that differ only by minor edits or other slight modifications. A good fingerprinting algorithm must ensure that such "natural" processes generate distinct fingerprints, with the desired level of certainty.
Compounding
Computer files are often combined in various ways, such as concatenation (as in archive files) or symbolic inclusion (as with the C preprocessor's directive). Some fingerprinting algorithms allow the fingerprint of a composite file to be computed from the fingerprints of its constituent parts. This "compounding" property may be useful in some applications, such as detecting when a program needs to be recompiled.
Algorithms
Rabin's algorithm
Rabin's fingerprinting algorithm is the prototype of the |
https://en.wikipedia.org/wiki/Disc2Phone | Disc2Phone is a freeware developed by Sony for Sony Ericsson phones to convert music from a computer or audio CD to MP3 format and send them to a Sony Ericsson mobile phone or to a Memory Stick card.
History
This program first came with the PC suite of the first Walkman phone W800i in 2005
System requirements
Microsoft Windows XP SP2 or higher or Vista
900MHz processor
At least 128 MB RAM
Memory Stick
Internet connection
NET Framework 2.0 and .NET framework 1.1 SP1
Windows Media Player 9 or higher
See also
Sony Ericsson
Sony
References
External links
Sony Ericsson
Disc2Phone Release Notes
Windows-only freeware
Music managers |
https://en.wikipedia.org/wiki/GSN%20Live | GSN Live is an American live interactive show on Game Show Network that premiered on February 25, 2008, at noon ET and officially ended its 3-year run on July 29, 2011. The last "live" edition aired May 13, 2011. It lasted three hours in between regular GSN programming and featured games that viewers played to win prizes over the phone, highlights from Classic game shows, interviews, behind-the-scenes views of GSN, and celebrity appearances. It was formerly hosted in two shifts. The first shift, from Noon to 3:00 p.m. ET was hosted by Heidi Bohay (with Alfonso Ribeiro until August 11, 2009). Fred Roggin hosted the 3:00 p.m. to 6:00 p.m. ET segment. Kelly Packard co-hosted from September 15 to November 28, 2008, and Roggin co-hosted the 3 hours with rotating guest hosts until Debra Skelton was chosen to replace Packard on May 26, 2009, the same day the current set was introduced and when it was hosted by three people. Fred Roggin left GSN Live on July 2, 2009, Alfonso Ribeiro left GSN Live on August 11, 2009, Debra Skelton left GSN Live in January 2010, and Heidi Bohay left the show in April 2010, making Bob Guiney currently the sole host. The show was executive produced by Burt Dubrow until March 6, 2009, and is currently produced by John Berkson, Gary Green, and Laura Slobin. The sound mixer was Mike Dooley. Budget cuts implemented by the new GSN executive regime are causing the almost weekly dismissals of production staff members from the show. Due to these cuts the show was cut from six hours to three hours and now runs from 3:00 p.m. to 6:00 p.m. ET. The staff was cut by 7 effective December 30, 2009, leaving the future of the show in question.
The show has run for three hours daily, Noon to 3:00 p.m. ET from its debut until September 12, 2008, and since October 12, 2009, from 3:00 p.m. to 6:00 p.m. ET. The hosts for the three-hour show were Fred Roggin and Heidi Bohay. On September 15, 2008, it expanded to six hours daily and ran from Noon to 6:00 p.m. ET until October 9, 2009. GSN Live was on hiatus for the week of May 18, 2009, to May 25, 2009, to transition to a new set, and returned on May 26, 2009.
Format
The interactive games on GSN Live are interspersed during regular programming for a short time when commercials would normally run. Games are introduced at the beginning of an hour and played by a caller near the end of the hour. There is only one player for each game. Entries can be made on the internet or over the phone, both having an equal chance of selection.
Every individual who logs on or calls to enter, whether they are chosen to play on the air live or not, is entered into a "Weekly Prize Bonanza" drawing for which a single prize is awarded once a week. Prizes in the first three weeks included a vacation package, diamond watches, and a cruise. (Currently, the prize is awarded monthly.) In addition, all contestants who play on-air are currently awarded 2,500 "Oodles," (5,000 on "Winner Wednesday" shows) an online currency |
https://en.wikipedia.org/wiki/Maria%20Adeodata%20Pisani | Maria Adeodata Pisani (29 December 180625 February 1855) was a Maltese nun whom Pope John Paul II venerated 24 April 2001 (decree of heroic virtues) and beatified 9 May 2001.
The day after John Paul II signed and released the decree on both her virtues and miracle, paving the path for the beatification 9 May 2001, the bishops released a pastoral letter emphasizing the serious difficulties that she had to face, stating that Maria Adeodata Pisani had had "a difficult childhood as her parents did not live together. She renounced and disposed of her wealth, willingly living as a cloistered nun."
Life
The only daughter of Baron Benedetto Pisani Mompalao Cuzkeri and Vincenza Carrano, she was born Maria Teresa Pisani in Naples, Italy on 29 December 1806, and baptized the same day in the Parish of St Mark at Pizzofalcone. Her father held the title of Baron of Frigenuin, one of the oldest and richest baronies in Malta; her mother was Italian.
Her father took to drink and this soon led to marital problems, so much so that whilst Pisani was still a small child her mother left the conjugal house and entrusted the child's care to her mother-in-law, Elisabeth Mamo Mompalao, who lived in Naples. Mompalao was a decent caregiver, but died when her granddaughter was only ten years old. After her grandmother’s death, Pisani was sent to the famous Istituto di Madama Prota, a boarding school in Naples where the daughters of the local aristocracy received their education.
In 1821 her father was involved in the uprising in Naples and sentenced to death. Since he was a British citizen, his sentence was suspended and King Ferdinand II of Naples had him expelled from Naples and deported to the Mediterranean island of Malta. In 1825, Pisani and her mother came to live in Malta, settling in Rabat.
Once in Malta, Pisani decided to become a nun, although her mother preferred that she marry. Besides suffering from delicate health, Pisani had a deformed shoulder, caused, it was testified, by injuries sustained at the hands of a maid who beat her when she lived with her grandmother in Naples. Although her mother tried to find her a suitable husband, Pisani invariably declined such proposals, preferring to lead a quiet life, of attending church and helping the poor. The people who knew her started to comment about her pious behavior.
Upon turning 21, she entered the Benedictine Community in St. Peter’s Monastery and took the name Maria Adeodata ("given by God"). She made her solemn profession two years later. In the cloister, Pisani was a seamstress, sacristan, porter, teacher and novice mistress. Her charity was a benefit to her fellow nuns and to many people outside the cloister as well.
Pisani wrote various works, the most well-known of which is The mystical garden of the soul that loves Jesus and Mary, a collection of her personal reflections between the years 1835 and 1843.
She was abbess from 1851 to 1853 but had to retire from her duties because she suffered from h |
https://en.wikipedia.org/wiki/Jim%20Brown%20%28computer%20scientist%29 | James A. Brown was manager of the group within IBM responsible for the programming language APL2 program product. APL2 was first available on IBM mainframe computers in 1980, and was later available under Linux, Unix, and Windows. In 1993, Brown received the Kenneth E. Iverson Award for Outstanding Contribution to APL from the Association for Computing Machinery.
In 1996, he left IBM to become a consultant and entrepreneur. In 1999, Brown cofounded SmartArrays, Inc., and has held a senior position in the company for many years. The firm develops specialized analytic software based on columnar databases, with memory-resident vector processing, for uses where customers consider commercial off-the-shelf software to be more expensive, slow, or limited.
References
External links
American computer scientists
Computer systems researchers
Programming language researchers
IBM employees
APL implementers
Living people
1943 births |
https://en.wikipedia.org/wiki/LINK%20480Z | The LINK 480Z was an 8-bit microcomputer produced by Research Machines Limited in Oxford, England, during the early 1980s.
The 480Z used a Z80 microprocessor with up to 256 KB of bank-switched RAM. The system could be used as a stand-alone unit with cassette-based storage and the BASIC programming language run from ROM, or it could boot CP/NOS (a network version of CP/M) over a local area network from a file server. When fitted with an optional external floppy disk drive the system could boot the CP/M operating system directly.
The 480Z was sold mainly to the UK educational market as cassette-based system or as a diskless node which could be connected, via the proprietary CHAIN Network, to a Research Machines 380Z acting as a file server.
Hardware
Main unit and processor
The LINK 480Z was packaged as an integrated keyboard and system unit. Early systems were supplied with a black sheet-metal case, however this was quickly replaced by a cream-coloured plastic housing. The optional 5¼-inch floppy disk drive unit was external.
The only microprocessor offered was a 4 MHz Z80A.
Memory
Although some early systems had only 32 KB (32 × 1024 bytes) of RAM, most 480Zs were fitted with at least 64 KB of memory. Bank switching allowed memory to be extended to 128 KB on the main board, and up to 256 KB by using the option board (which also included the high resolution graphics hardware). As the Z80 processor could directly address only 64 KB without software support the additional memory was typically used as a RAM disk, specifically the Silicon Disk System. The silicon disk could be automatically loaded with software and data when the 480Z booted to the network. This saved considerable time in a classroom setting, where software could be loaded in advance of the children arriving. The silicon disc retained its contents if the system underwent a soft reset.
The 480Z was also fitted with up to 32 KB of firmware that could also be bank-switched out of the normal address space when not in use, leaving a total of 58 KB of RAM directly available to the user, with 2 KB of RAM reserved for system use and 4 KB inaccessible because of the firmware ROM.
Video
All 480Zs, with the exception of some very early units, were fitted with software-switchable 40×24 or 80×24 character text-only monochrome video hardware. Composite video output was provided for an external monitor, and an internal RF modulator provided a separate output to drive a television set. The text-mode display had its own dedicated memory.
In addition to the text-mode video interface the system could be enhanced with an option board providing a high-resolution graphics capability and an additional TTL RGB interface for a colour monitor. The board was fitted with a dedicated bank of 16 KB of video memory and supported three graphics modes:
Extra high resolution: 640×192 pixels, 1 bit per pixel, 1 page.
High resolution: 320×192 pixels, 2 bits per pixel, 1 page.
Medium resolution: 160×96 pixels, 4 |
https://en.wikipedia.org/wiki/BIBSYS | BIBSYS is an administrative agency set up and organized by the Ministry of Education and Research in Norway. They provide the exchange, storage and retrieval of data pertaining to research, teaching and learning – historically metadata related to library resources.
BIBSYS are collaborating with all Norwegian universities and university colleges as well as research institutions and the National Library of Norway. Bibsys is formally organized as a unit at the Norwegian University of Science and Technology (NTNU), located in Trondheim, Norway. The board of directors is appointed by Norwegian Ministry of Education and Research.
BIBSYS offer researchers, students and others an easy access to library resources by providing the unified search service Oria.no and other library services. They also deliver integrated products for the internal operation for research and special libraries as well as open educational resources.
As a DataCite member BIBSYS act as a national DataCite representative in Norway and thereby allow all of Norway's higher education and research institutions to use DOI on their research data.
All their products and services are developed in cooperation with their member institutions.
History
BIBSYS began in 1972 as a collaborative project between the Royal Norwegian Society of Sciences and Letters Library (Det Kongelige Norske Videnskabers Selskabs Bibliotek), the Norwegian Institute of Technology Library and the Computer Centre at the Norwegian Institute of Technology. The purpose of the project was to automate internal library routines. Since 1972 Bibsys has evolved from a library system supplier for two libraries in Trondheim, to developing and operating a national library system for Norwegian research and special libraries. The target group has also expanded to include the customers of research and special libraries, by providing them easy access to library resources.
BIBSYS is a public administrative agency answerable to the Ministry of Education and Research, and administratively organised as a unit at NTNU. In addition to BIBSYS Library System, the product portfolio consists of BISBYS Ask, BIBSYS Brage, BIBSYS Galleri and BIBSYS Tyr. All operation of applications and databases is performed centrally by BIBSYS. BIBSYS also offer a range of services, both in connection with their products and separate services independent of the products they supply.
See also
Open access in Norway
References
External links
About Bibsys
Library-related organizations
Libraries in Norway
Norwegian University of Science and Technology
1972 establishments in Norway
Government agencies established in 1972
Library centers
Library cataloging and classification |
https://en.wikipedia.org/wiki/IBM%20Kittyhawk | Kittyhawk is an IBM supercomputer. The proposed project entails constructing a global-scale shared supercomputer capable of hosting the entire Internet on one platform as an application, whereas the current Internet is a collection of interconnected computer networks.
In 2010 IBM open sourced the Linux kernel patches that allow otherwise unmodified Linux distributions to run on Blue Gene/P. This action allowed the Kittyhawk system software stack to be run at large scale at Argonne National Lab. The open source version of Kittyhawk is available on a public website hosted by Boston University.
In 2012 the Kittyhawk project was made a part of the United States Department of Energy fault oblivious execution (FOX) project, and ported to run on the Intrepid supercomputer at Argonne National Laboratory.
In 2013 researchers used the Kittyhawk project to demonstrate a novel high-performance cloud computing platform by merging a cloud computing environment with a supercomputer.
Specifications
IBM Research has published three papers detailing the project. Kittyhawk will be based on the previously developed IBM supercomputer called Blue Gene/P. In theory, Kittyhawk can have up to 16,384racks, for a total of 67.1million cores and 32PB (32×250 bytes) of memory.
See also
List of IBM products
References
External links
Current Kittyhawk Homepage (Boston University)
Towards a Global Scale Public Computer — lecture given by IBM Engineer, Jonathan Appavoo at Stanford University (video archive).
Kittyhawk
Massively parallel computers |
https://en.wikipedia.org/wiki/IP%20PBX | An IP PBX ("Internet Protocol private branch exchange") is a system that connects telephone extensions to the public switched telephone network (PSTN) and provides internal communication for a business. An IP PBX is a PBX system with IP connectivity and may provide additional audio, video, or instant messaging communication utilizing the TCP/IP protocol stack.
Voice over IP (VoIP) gateways can be combined with traditional PBX functionality to allow businesses to use their managed intranet to help reduce long distance expenses and take advantage of the benefits of a single network for voice and data (converged network). An IP PBX may also provide CTI features.
An IP PBX can exist as a physical hardware device or as a software platform.
Function
IP PBX is primarily a software hosted on a regular desktop or server as per the requirement demands based on the expected traffic & criticality. Till 2019 IP PBX were deployed primarily as inbound and outbound call center solutions for large corporate and commercial cloud telephony operators worldwide cloud communications. Most of the IP PBX installation uses Asterisk (PBX) for its telephony support, built on LAMP (Linux-Apache-MySQL-PHP). With telecom service providers across the world is slowly preferring SIP Trunks over Primary Rate Interface as main enterprise communication delivery, the IP PBXs will now be in demand extensively. As IP PBX is software, functions and features can be designed based on the customers' requirements such as conference calling, XML-RPC control of live calls, interactive voice response (IVR), TTS/ASR (text to speech/automatic speech recognition), PSTN interconnectability supporting both analog and digital circuits, VoIP protocols including SIP, Inter-Asterisk eXchange, H.323, Jingle and others.
IP PBX software
3CX Phone System - Was based on Windows operating system, but now has windows and linux versions.
Asterisk - Based on Linux operating system and has the largest market share.
Most of the other IP PBXs were derived and customised on Asterisk as you will find a very long list.
Bicom Systems
Dialexia
trixbox (formerly Asterisk@Home)
FreeSWITCH
See also
Cloud communications
References
Office equipment
Telecommunications equipment
VoIP software |
https://en.wikipedia.org/wiki/Skills%20for%20Business | The Skills for Business network is an umbrella organisation for the twenty-five Sector Skills Councils in the United Kingdom.
History
The whole set of SSCs are funded by the UK Commission for Employment and Skills.
Sector Skills Councils
Skills CFA - business skills
People 1st - hospitality, leisure, travel and tourism www.people1st.co.uk
Skills for Care and Development
Skillsmart Retail
Skillset - creative industry
GoSkills
Construction Skills
The Institute of the Motor Industry (formerly Automotive Skills)
SEMTA
Financial Services Skills Council
Creative & Cultural Skills - advertising
Skills for Justice
Cogent - chemicals and pharmaceuticals
Skills for Health
Lifelong Learning UK
e-skills UK - IT industry
Skillfast-UK - fashion - closed 31 March 2010 and merged with Skillset
Energy and Utility Skills
Lantra - environment and rural
Improve Ltd - food and drink manufacturing
SkillsActive - sport
Proskills UK
SummitSkills - building services engineering (air conditioning and refrigeration, electrotechnical, heating and ventilating, and plumbing) www.summitskills.org.uk
Asset Skills - property management
Skills for Logistics
Government Skills - central government
External links
Skills for Business
Sector Skills Councils
Department for Business, Innovation and Skills |
https://en.wikipedia.org/wiki/Performance%20per%20watt | In computing, performance per watt is a measure of the energy efficiency of a particular computer architecture or computer hardware. Literally, it measures the rate of computation that can be delivered by a computer for every watt of power consumed. This rate is typically measured by performance on the LINPACK benchmark when trying to compare between computing systems: an example using this is the Green500 list of supercomputers. Performance per watt has been suggested to be a more sustainable measure of computing than Moore’s Law.
System designers building parallel computers, such as Google's hardware, pick CPUs based on their performance per watt of power, because the cost of powering the CPU outweighs the cost of the CPU itself.
Spaceflight computers have hard limits on the maximum power available and also have hard requirements on minimum real-time performance. A ratio of processing speed to required electrical power is more useful than raw processing speed.
Definition
The performance and power consumption metrics used depend on the definition; reasonable measures of performance are FLOPS, MIPS, or the score for any performance benchmark. Several measures of power usage may be employed, depending on the purposes of the metric; for example, a metric might only consider the electrical power delivered to a machine directly, while another might include all power necessary to run a computer, such as cooling and monitoring systems. The power measurement is often the average power used while running the benchmark, but other measures of power usage may be employed (e.g. peak power, idle power).
For example, the early UNIVAC I computer performed approximately 0.015 operations per watt-second (performing 1,905 operations per second (OPS), while consuming 125 kW). The Fujitsu FR-V VLIW/vector processor system on a chip in the 4 FR550 core variant released 2005 performs 51 Giga-OPS with 3 watts of power consumption resulting in 17 billion operations per watt-second. This is an improvement by over a trillion times in 54 years.
Most of the power a computer uses is converted into heat, so a system that takes fewer watts to do a job will require less cooling to maintain a given operating temperature. Reduced cooling demands makes it easier to quiet a computer. Lower energy consumption can also make it less costly to run, and reduce the environmental impact of powering the computer (see green computing).
If installed where there is limited climate control, a lower power computer will operate at a lower temperature, which may make it more reliable. In a climate controlled environment, reductions in direct power use may also create savings in climate control energy.
Computing energy consumption is sometimes also measured by reporting the energy required to run a particular benchmark, for instance EEMBC EnergyBench. Energy consumption figures for a standard workload may make it easier to judge the effect of an improvement in energy efficiency.
Perform |
https://en.wikipedia.org/wiki/Suin | Suin may refer to:
Suin, Rajasthan, a village in Rajasthan, India
Suin, Saône-et-Loire, a commune in the French region of Bourgogne
Sudanese Universities Information Network, a national research and education network
Korean rail lines
Suin Line (1937–1945), a narrow gauge line of the Chōsen Railway in Gyeonggi Province
Suin Line, a metro line of the Seoul Metropolitan Subway serving the Seoul Capital Area, active 2012–2020
Suin–Bundang Line, a commuter rail service of the Seoul Metropolitan Subway system, opened in 2020 |
https://en.wikipedia.org/wiki/Bertha%20Brainard | Bertha Brainard (June 16, 1890 – June 11, 1946), known to her friends as Betty, was a pioneering NBC executive responsible for setting trends in network broadcasting.
Life and career
She was born and raised in South Orange, New Jersey, the daughter of Henry Brainard (a former journalist and publisher) and his wife Ada. After graduating high school, she attended a teacher's college in nearby Montclair, but subsequently decided she did not want to teach. During the war, she drove an ambulance for the Red Cross, and with some encouragement from her brother, she decided to try to find work in the new medium of radio. She became a theater critic, and began hosting a program called Broadcasting Broadway for WJZ in Newark beginning in March 1922. By 1923, she became the station's assistant program director, helping to select the live performers and later doing critiques of the station's announcers. By October 1926, she had moved up to program manager.
After she became head of programming for NBC in 1928, the network's first woman executive, she began pushing for singer-bandleader Rudy Vallée to host a variety series by explaining that only a woman could understand the appeal of Vallée's voice.
The Fleischmann's Yeast Hour (aka The Rudy Vallée Show, aka The Fleischmann Yeast Hour, aka The Fleischmann Hour) was then launched as a musical variety radio program on NBC from 1929 to 1936, when it became The Royal Gelatin Hour, continuing until 1939.
Beginning October 24, 1929, the show quickly became a top-rated program, second only to Amos 'n' Andy. Host Vallée appeared along with regulars Ole Olsen and Chic Johnson (1932), followed by Tom Howard and George Shelton (1935). On this show, the American listening audience heard many future stars for the first time, as it introduced such talents as Milton Berle, Burns and Allen, Alice Faye, the Mills Brothers and Kate Smith. Gloria Swanson made her radio debut. Other guests included Ray Bolger, Fannie Brice, Ilka Chase, Helen Hayes and Bert Lahr.
Radio comedy
Brainard also introduced satire to radio by commissioning Raymond Knight to create a comedy show. Knight was writing continuity and commercials for NBC in 1929, when Brainard asked him to devise "something cuckoo" for the Blue Network. He responded with the zany The Cuckoo Hour (aka The KUKU Hour) as a showcase for his wacky humor, performing as Ambrose J. Weems.
Brainard remained an NBC executive until 1946 when she married advertising executive Curt Peterson, with whom she had worked over the years. Her retirement and marriage were brief, as she died of a heart attack, in Huntington, New York, later that year.
References
Further reading
Hilmes, Michele. Only Connect: A Cultural History of Broadcasting. Wadsworth, 2002.
Kaiser, Florence V. “Women Take Places as Radio Directors.” Washington Post, December 16, 1928, p. RA3.
Scully, Michael. “The Girl Boss of WJZ.” McClure's, vol. 59, #2, August 1927, pp. 39, 122.
American radio executives
1946 d |
https://en.wikipedia.org/wiki/Patrick%20McGovern | Patrick McGovern may refer to:
Patrick Aloysius Alphonsus McGovern (1872–1951), former Bishop of Cheyenne
Patrick Joseph McGovern (1937–2014), American businessman, founder of International Data Group
Patrick McGovern (Irish politician) (1875–1949), Irish Centre Party/Fine Gael politician
Patrick Edward McGovern (born 1944), biomolecular archaeologist, University of Pennsylvania Museum
Patrick Terence McGovern (1920–1984), Irish Catholic priest and unofficial member of the Legislative Council of Hong Kong |
https://en.wikipedia.org/wiki/Statistical%20graphics | Statistical graphics, also known as statistical graphical techniques, are graphics used in the field of statistics for data visualization.
Overview
Whereas statistics and data analysis procedures generally yield their output in numeric or tabular form, graphical techniques allow such results to be displayed in some sort of pictorial form. They include plots such as scatter plots, histograms, probability plots, spaghetti plots, residual plots, box plots, block plots and biplots.
Exploratory data analysis (EDA) relies heavily on such techniques. They can also provide insight into a data set to help with testing assumptions, model selection and regression model validation, estimator selection, relationship identification, factor effect determination, and outlier detection. In addition, the choice of appropriate statistical graphics can provide a convincing means of communicating the underlying message that is present in the data to others.
Graphical statistical methods have four objectives:
The exploration of the content of a data set
The use to find structure in data
Checking assumptions in statistical models
Communicate the results of an analysis.
If one is not using statistical graphics, then one is forfeiting insight into one or more aspects of the underlying structure of the data.
History
Statistical graphics have been central to the development of science and date to the earliest attempts to analyse data. Many familiar forms, including bivariate plots, statistical maps, bar charts, and coordinate paper were used in the 18th century. Statistical graphics developed through attention to four problems:
Spatial organization in the 17th and 18th century
Discrete comparison in the 18th and early 19th century
Continuous distribution in the 19th century and
Multivariate distribution and correlation in the late 19th and 20th century.
Since the 1970s statistical graphics have been re-emerging as an important analytic tool with the revitalisation of computer graphics and related technologies.
Examples
Famous graphics were designed by:
William Playfair who produced what could be called the first line, bar, pie, and area charts. For example, in 1786 he published the well known diagram that depicts the evolution of England's imports and exports,
Florence Nightingale, who used statistical graphics to persuade the British Government to improve army hygiene,
John Snow who plotted deaths from cholera in London in 1854 to detect the source of the disease, and
Charles Joseph Minard who designed a large portfolio of maps of which the one depicting Napoleon's campaign in Russia is the best known.
See the plots page for many more examples of statistical graphics.
See also
Data Presentation Architecture
List of graphical methods
Visual inspection
Chart
List of charting software
References
Citations
Attribution
Further reading
External links
Trend Compass
Alphabetic gallery of graphical techniques
DataScope a website devoted to data |
https://en.wikipedia.org/wiki/Sharp%20PC-1600 | The Sharp PC-1600 was a pocket computer introduced by Sharp in 1986 as a successor to the PC-1500. The PC-1600 provided compatibility with its predecessor through the use of a slave CPU that could run assembly language programs targeting the older machine. It could also switch into a compatibility mode so that programs written for the single line display of the PC-1500 could work with the four line display of the PC-1600.
PC-1500 peripherals such as the CE-150 cassette interface were also supported.
Technical specifications
SC7852 CMOS 8 bit microprocessor, equivalent to the Z-80A, 3.58 MHz
LH-5803 slave CPU compatible with PC-1500, 1.3 MHz
LU57813P sub CPU, 307.2 kHz
96K ROM
16K RAM, expandable to 80K
26 column, 4 line LCD with a 5x7 character matrix
156x32 dot graphics
Real time clock
RS-232C interface
Optical serial port
Analogue interface for connection to sensors
390 g in weight with batteries
Accessories
CE-1600M program module providing 32K of battery backed storage
CE-1600P Printer/Cassette interface
CE-1600F 2.5-inch double-sided pocket disk drive providing 64K of storage per side with CE-1650F media
See also
Sharp pocket computer character sets
References
Further reading
External links
The Ultimate Pocket Computer Original product brochures and source for accessories
Sharp PC-1600 site by Harald Richter German with sections in English and French
PC-1600
PC-1600 |
https://en.wikipedia.org/wiki/Turing%20Talk | The Turing Talk, previously known as the Turing Lecture, is an annual award lecture delivered by a noted speaker on the subject of Computer Science. Sponsored and co-hosted by the Institution of Engineering and Technology (IET) and the British Computer Society, the talk has been delivered at different locations in the United Kingdom annually since 1999. Venues for the talk have included Savoy Place, the Royal Institution in London, Cardiff University, The University of Manchester, Belfast City Hall and the University of Glasgow. The main talk is preluded with an insight speaker, who performs an opening act to the main event.
The talk is named in honour of Alan Turing and should not be confused with the Turing Award lecture organised by the Association for Computing Machinery (ACM). Recent Turing talks are available as a live webcast and archived online.
Turing Talks
Previous speakers have included:
2022: Julie McCann, a day in the life of a smart city
2021: Cecilia Mascolo, Sounding out wearable and audio data for health diagnostics
2020: Mark Girolami, Digital Twins: The Next Phase of the AI Revolution
2019: Engineering a fair future: Why we need to train unbiased AI
2018: Andy Harter, Innovation and technology – art or science?
2017: Guruduth Banavar, Beneficial AI for the Advancement of Humankind
2016: Robert Schukai, The Internet of Me: It's all about my screens
2015: Robert Pepper, The Internet Paradox: How bottom-up beat(s) command and control
2014: Bernard S. Meyerson, Beyond silicon: Cognition and much, much more
2013: Suranga Chandratillake, What they didn't teach me: building a technology company and taking it to market
2012: Ray Dolan, From cryptoanalysis to cognitive neuroscience – a hidden legacy of Alan Turing
2011: Donald Knuth, An Evening with Donald Knuth – All Questions Answered
2010: Christopher Bishop. Embracing Uncertainty: the new machine intelligence
2009: Mike Brady, Information Engineering and its Future
2008: James Martin, Target Earth and the meaning of the 21st century
2007: Grady Booch, The Promise, the Limits and the Beauty of Software
2006: Chris Mairs, Lifestyle access for the disabled
2005: Fred Brooks, Collaboration and Telecollaboration in Design
2004: Fred Piper, Cyberspace Security, The Good, The Bad & The Ugly
2003: Caroline Kovac, Computing in the Age of the Genome
2002: Mark Welland, Smaller, faster, better – but is it nanotechnology?
2001: Nick Donofrio, Technology, Innovation and the New Economy
2000: Brian Randell, Facing up to Faults
1999: Samson Abramsky From Computation to Interaction – Towards a Science of Information
See also
Pinkerton Lecture
References
1998 establishments in the United Kingdom
Recurring events established in 1998
British lecture series
Computer science education
Academic awards
British Computer Society
Institution of Engineering and Technology
Alan Turing |
https://en.wikipedia.org/wiki/Barbie%20%26%20the%20Diamond%20Castle | Barbie & the Diamond Castle is a 2008 direct-to-video computer-animated musical film directed by Gino Nichele and produced by Mattel Entertainment with Rainmaker Entertainment. It first premiered on Nickelodeon on September 7, 2008, and it was later released to DVD on September 9, 2008.
The thirteenth entry in the Barbie film series, the film features the voice of Kelly Sheridan as Barbie and the cover of the song "Connected" recorded by Katharine McPhee. It follows the story of Liana and Alexa (the in-universe roles of the dolls, Barbie and Teresa) on their journey to find the mysterious diamond castle.
Plot
While Barbie and Teresa are playing music, Barbie’s sister Stacie storms in, having had a fight with her friend Courtney. Barbie and Teresa tell Stacie a story to teach her the power of friendship.
Liana and Alexa are two friends who share a love for music, and live in a cottage where they grow and sell flowers for a living. One day, they find two heart-shaped stones and make them into necklaces to symbolize their friendship. That evening, a storm occurs, destroying their garden. The next day, Liana offers her food to a poor, old woman who gives them a mirror in exchange. Later, the two hear a voice from the mirror and find a girl inside it named Melody. The trio bond over music and Melody teaches them a song; but they are soon attacked by a dragon named Slyder. They manage to escape him, but their cottage catches fire and burns down.
Melody explains that she was once the apprentice of the three Muses, Dori, Phaedra, and Lydia, who lived in the Diamond Castle. Lydia turned evil and planned to take the Diamond castle for herself. After hiding the castle and entrusting Melody with its key, Lydia turned the other Muses into stone; Melody, fleeing Slyder, hid and inadvertently trapped herself inside the mirror. Melody tells Liana and Alexa that Lydia can be defeated if they play the Muses' instruments. Liana insists on helping Melody and Alexa reluctantly agrees. On their journey, Liana and Alexa adopt two puppies, naming them Sparkles and Lily. The girls are confronted by Lydia who orders them to hand over Melody. When they refuse, Lydia attempts to hypnotize them with her flute but they are shielded by the stones on their necklaces (revealed to be from the Diamond Castle). The girls escape with the help of twins Ian and Jeremy who join them on their journey; but are separated when Liana and Alexa are carried off by a magic bridge.
Liana and Alexa arrive at a mansion and are greeted by its hosts who, hypnotized by Lydia, tell them that they are the mansion's prophesied owners. Alexa suggests abandoning their quest and remaining in the mansion, causing her and Liana to argue. Liana and Melody leave and Alexa angrily takes off her necklace, whereupon she is captured and hypnotized by Lydia. Liana and Melody are abducted by Slyder. Alexa is ordered to leap off a ledge if Melody does not surrender the castle's key. Melody agrees, to save her a |
https://en.wikipedia.org/wiki/JUGENE | JUGENE (Jülich Blue Gene) was a supercomputer built by IBM for Forschungszentrum Jülich in Germany. It was based on the Blue Gene/P and succeeded the JUBL based on an earlier design. It was at the introduction the second fastest computer in the world, and the month before its decommissioning in July 2012 it was still at the 25th position in the TOP500 list. The computer was owned by the "Jülich Supercomputing Centre" (JSC) and the Gauss Centre for Supercomputing.
With 65,536 PowerPC 450 cores, clocked at 850 MHz and housed in 16 cabinets the computer reaches a peak processing power of 222.8 TFLOPS (Rpeak). With an official Linpack rating of 167.3 TFLOPS (Rmax) JUGENE took second place overall and is the fastest civil/commercially used computer in the TOP500 list of November 2007.
The computer was financed by Forschungszentrum Jülich, the State of North Rhine-Westphalia, the Federal Ministry for Research and Education as well as the Helmholtz Association of German Research Centres. The head of the JSC, Thomas Lippert, said that "The unique thing about our JUGENE is its extremely low power consumption compared to other systems even at maximum computing power". A Blue Gene/P-System should reach about 0.35 GFLOPS/Watt and is therefore an order of magnitude more effective than a common x86 based supercomputer for a similar task.
In February 2009 it was announced that JUGENE would be upgraded to reach petaflops performance in June 2009, making it the first petascale supercomputer in Europe.
On May 26, 2009, the newly configured JUGENE was unveiled. It includes 294,912 processor cores, 144 terabyte memory, 6 petabyte storage in 72 racks. With a peak performance of about one PetaFLOPS, it was at the time the third fastest supercomputer in the world, ranking behind IBM Roadrunner and Jaguar. The new configuration also incorporates a new water cooling system that will reduce the cooling cost substantially.
The two front nodes of JUGENE are operated with SUSE Linux Enterprise Server 10.
JUGENE was decommissioned on 31 July 2012 and replaced by the Blue Gene/Q system JUQUEEN.
References
IBM supercomputers
Parallel computing
Petascale computers
Supercomputing in Europe |
https://en.wikipedia.org/wiki/Comparator%20%28disambiguation%29 | Comparator may refer to:
A biological comparator system
An electrical comparator
various data comparators including cmp and diff
A digital comparator
An optical comparator
Mathematical symbols used for comparison, for example can the equals sign be used to compare if two values are equivalent, or inequality signs can be used to compare if two values are different
The Comparator Hypothesis in the psychology of motivation |
https://en.wikipedia.org/wiki/Bone%20Dance | Bone Dance is a 1991 novel by American writer Emma Bull, described variously as fantasy, hard science fiction and cyberpunk. It was nominated for the Hugo, Nebula and World Fantasy Awards in 1992.
Setting
Although the city in which Bone Dance is set is not named, it appears to be a climate-modified Minneapolis, the author's setting for her first novel, War for the Oaks. The novel features references to Tarot (each of ten sections is named for a card) and Louisiana Voodoo. It is subtitled "A Fantasy for Technophiles" and the central place of devices generally, and electronics specifically, justifies that label. Since the time is a post-nuclear-clash future following a war between the Americas, North and South, skill at maintaining and repairing salvaged artifacts is valuable. So are pre-collapse artifacts themselves. Sparrow, the point-of-view character, makes a living by bartering such skill, along with occasional sales of scavenged artifacts. Sparrow is a bioengineered human, though that case is not plainly stated until half-way through the story.
Plot summary
In the opening scene, Sparrow cannot recall what took place in the preceding 36 hours. Awakening yet again in a novel place with new hurts, the urge to fix the problem is intense. On the way to enlightenment comes a cryptic Tarot reading from friend Sherrea, abduction by a dead man animated by what might as well be a Loa, and introduction to a Vodun-based community that is dedicated to replacement, and if necessary to overthrow, of the status quo in the city. The latter has the individual most responsible for the inter-continental war near its power apex, a character who is also the revenge target of another survivor from his kind. Those are the "Horsemen", modified people who can move their consciousness from body to body.
The second half of the story shows Sparrow's awkward progress toward a fully human condition and becoming a valued member of a community, and is capped by a closing conceit: that the whole telling has been an autobiography.
Reception
Bone Dance is regarded by scholars as defying genre and gender conventions: its setting blends fantasy with hard science fiction, while its protagonist blurs gender boundaries. Academic Veronica Hollinger termed the book "a feminist revision of 1980s cyberpunk", noting that its hard-boiled tone shared similarities to William Gibson's Neuromancer. The novel employs cyberpunk motifs such as mind control and genetic engineering to explore themes of gender identity. The construction of Sparrow's self-identity was described by academic Jane Donawerth as reminiscent of Mary Shelley's Frankenstein.
Bone Dance was nominated for numerous awards, including the Hugo, Locus, Nebula and World Fantasy Awards, and received a special citation at the Philip K. Dick Award.
References
Sources
1991 American novels
American fantasy novels
Contemporary fantasy novels
Fiction about Louisiana Voodoo
Novels set in Minneapolis |
https://en.wikipedia.org/wiki/David%20P.%20Dobkin | David Paul Dobkin is an American computer scientist and the Phillip Y. Goldman '86 Professor of Computer Science at Princeton University. His research has concerned computational geometry and computer graphics.
Early life and education
Dobkin was born February 29, 1948, in Pittsburgh, Pennsylvania. He received a B.S. from the Massachusetts Institute of Technology in 1970 and then moved to Harvard University for his graduate studies, receiving a Ph.D. in applied mathematics in 1973 under the supervision of Roger W. Brockett.
Career
He taught at Yale University and the University of Arizona before moving to Princeton in 1981. He was initially appointed to the Department of Electrical Engineering and Computer Science at Princeton and was subsequently named one of the first professors of Computer Science when that department was formed in 1985. In 1999, he became the first holder of the Goldman chair after its namesake donated two million dollars to the university. He was chair of the Computer Science Department at Princeton from 1994 to 2003, and in 2003 was appointed Dean of the Faculty. David Dobkin also chaired the governing board of The Geometry Center, a NSF-established research and education center at the University of Minnesota.
Dobkin has been on the editorial boards of eight journals.
Recognition
In 1997 he was selected as a Fellow of the Association for Computing Machinery for his contributions to both fields.
References
Further reading
Dobkin keeps pace with faculty interests, Princeton Weekly Bulletin, January 9, 2006
External links
Dobkin's web site at the Princeton Computer Science department
Dobkin's publications at DBLP
1948 births
Living people
Massachusetts Institute of Technology alumni
Harvard University alumni
Yale University faculty
University of Arizona faculty
Princeton University faculty
American computer scientists
Researchers in geometric algorithms
Computer graphics researchers
Fellows of the Association for Computing Machinery
Taylor Allderdice High School alumni
Fulbright alumni |
https://en.wikipedia.org/wiki/WNSL | WNSL (100.3 FM, "SL100") is a top 40 (CHR) music formatted radio station licensed to Laurel, Mississippi, serving the Laurel-Hattiesburg Arbitron market.
Programming
SL100 is an affiliate of the syndicated Johnjay and Rich. It is also an affiliate of the syndicated On Air with Ryan Seacrest and Dawson McAllister Live.
History
WNSL-FM went on the air March 10, 1959, a simulcast of WNSL AM 1260 (today's WHJA at 890 AM). WNSL-AM-FM was founded by Granville Walters, a former news reporter and host at WAML, the first radio station in Laurel. Walters was the general manager of WNSL until 1983, and for most of those years, he reported the news in the morning drive slot. For years, WNSL-AM-FM had a country music format (the AM moniker was Dixie's 1260 for a time), and it was famous for the "Masonite Whistle", a music and news program broadcast from 6:00 - 6:30 a.m. and sponsored by Masonite Corporation, for the benefit of its employees. A common phrase used in the program was "for those getting up or those getting in", presumably to cater to employees of the night and morning shifts. This program continued as a simulcast on both AM and FM stations, despite changes in formats and call letters, until 1984. At one point, the FM format was changed to R&B and was known as Soul-100, before adopting the current Top 40 format in the late 1970s. The AM format remained country until the change in FM format. Then, the AM station broke off completely as R&B outlet WQIS "Super Q 1260".
In 1981, WNSL built a new transmitter tower near Moselle, Mississippi, with an ERP of 33,000 watts. In 1985, when WNSL built a new transmitter tower near Ellisville, Mississippi, the transmitter in Moselle became the new transmitter tower for WQIS. WNSL successfully tapped into the Hattiesburg market, targeting students at the University of Southern Mississippi, competing with Top 40 station WHSY "Y-104". In 1983, Granville Walters retired and sold his part in WNSL/WQIS to Bob Holladay, who was the son of Mr. Walters' partner, Ed Holladay of Meridian. Under Bob Holladay's watch, the station gained prominence as a Top 40 station. Holladay managed to lure DJs from other larger markets, particularly Meridian, to WNSL. The new tower built in 1985 was 1,000 feet over average terrain, and WNSL upgraded to an ERP of 100,000 watts. This new tower was capable of handling multiple stations and initially was shared with WHER-FM 103.7 in Hattiesburg, an easy listening FM station; upon the inauguration of the new tower, WNSL changed its legal identification to WNSL Laurel-Hattiesburg-Meridian in an effort to tap into the Meridian radio market and compete with Top 40 station WJDQ "Q-101". As part of the campaign, Holladay hired Mike Golden, a former news anchor with WTOK-TV in Meridian, as news director. The station also arranged for a relayed broadcast at 100.5 on cable in Meridian, as the radio signal was not strong in areas on the north side of Meridian. This campaign proved to yiel |
https://en.wikipedia.org/wiki/XO-2 | XO-2 may refer to:
XO-2 (star), a binary star system in the constellation Lynx
XO-2Nb, an extrasolar planet orbiting the above star
OLPC XO-2, a design study of the One Laptop per Child computer |
https://en.wikipedia.org/wiki/DYKI | DYKI (89.9 FM), broadcasting as 89.9 MemoRieS FM, is a radio station owned and operated by Primax Broadcasting Network. Its studios and transmitter facilities are located at the Suite 106, Vacation Hotel Cebu, #35 Juana Osmena St, Cebu City.
History
The station was established in 1998 as K-Lite 89.9, airing an Indie pop and Alternative rock format. It became an affiliate of Raven Broadcasting Corporation in Manila, which owns a station with City Lite. The following year, it was rebranded as K89.9. In early 2000, the station ceased to be an affiliate as RBC changed hands and rebranded as Smooth FM 89.9 with the tagline "Your Life, Your Music". It switched to a smooth jazz format. In late-January 2017, Smooth FM 89.9 quietly signed off for the last time and went off the air for a week.
In March 2017, the station became an affiliate of the RMN Networks and rebranded as 89.9 MemoRieS FM with a classic hits format.
References
Radio stations in Metro Cebu
Radio stations established in 1998 |
https://en.wikipedia.org/wiki/Single%20Table%20Inheritance | Single table inheritance is a way to emulate object-oriented inheritance in a relational database. When mapping from a database table to an object in an object-oriented language, a field in the database identifies what class in the hierarchy the object belongs to. All fields of all the classes are stored in the same table, hence the name "Single Table Inheritance". In Ruby on Rails the field in the table called 'type' identifies the name of the class. In Hibernate (Java) and Entity Framework this pattern is called Table-Per-Class-Hierarchy and Table-Per-Hierarchy (TPH) respectively., and the column containing the class name is called the Discriminator column.
See also
Object–relational mapping
ActiveRecord (Rails)
References
External links
Single Table Inheritance
Single Table Inheritance in Yii
Single Table Inheritance in Django
Database theory |
https://en.wikipedia.org/wiki/Krishna%20Palem | Krishna V. Palem is a computer scientist and engineer of Indian origin and is the Kenneth and Audrey Kennedy Professor of Computing at Rice University and the director of Institute for Sustainable Nanoelectronics (ISNE) at Nanyang Technological University (NTU). He is recognized for his "pioneering contributions to the algorithmic, compilation, and architectural foundations of embedded computing", as stated in the citation of his 2009 Wallace McDowell Award, the "highest technical award made solely by the IEEE Computer Society".
Education
Dr. Krishna V Palem received his BE degree in Electronics and Communication Engineering from Regional Engineering College, Tiruchirappalli (now, National Institute of Technology, Tiruchirappalli) in 1979. He obtained his Master of Science and Doctorate of Philosophy degree in Electrical and Computer Engineering from University of Texas at Austin.
Career
He started his career in 1986 as a Research Staff Member at the IBM Thomas J. Watson Research Center where he worked on Probabilistic Algorithms and Optimizing Compilers till 1994. Since 1994, he held tenured faculty positions at the Courant Institute of Mathematical Sciences at NYU (1994–1999) and Georgia Institute of Technology (1999–2006). Since 2007, he has been at Rice University with joint appointments in Computer Science, Electrical and Computer Engineering and Statistics.
In 2000, Palem co-founded the Proceler Inc., an Atlanta-based venture-funded company and served as its Chief Technology Officer.
In 2006–2007, he was both a Canon visiting professor at Nanyang Technological University, Singapore and a Moore Distinguished Faculty Fellow at the California Institute of Technology.
In 2007, he also founded the Institute for Sustainable Nanoelectronics (ISNE) at Nanyang Technological University, Singapore and served as its director till 2013.
In 1998, with Guang Gao, he started the International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES) workshop series which has since grown into the ACM/IEEE sponsored CASES symposium, one of the three anchor conferences of the Embedded Systems Week (ESWeek).
Research
After he moved to NYU in 1994, he founded and headed one of the earliest computer science laboratories in academia on the topic of Embedded Computing called Real-time Compilation Technologies and Instruction Level Parallelism (ReaCT-ILP) within the Courant Institute of Mathematical Sciences. His views expressed in 1996 suggesting the "need for programming tools and software support to eventually compile algorithms implemented in standard and widely used languages such as C onto the hardware platforms" was the mission statement of this laboratory. His PhD advisee Suren Talla's dissertation on this topic, 'Adaptive EPIC Architectures and their Compilers', was awarded the Janet Fabri prize.
Palem fully developed this concept through 'architecture assembly' through Proceler Inc. Architecture assembly was the f |
https://en.wikipedia.org/wiki/Samanyolu%20Haber%20TV | Samanyolu Haber TV was one of the Turkish national news channels broadcasting internationally. It was launched after expansion of Samanyolu TV network which included Mehtap TV (a culture oriented channel), Burc FM (a culture oriented radio channel), Yumurcak TV (a children's channel), and Dünya Radyo (an entertainment channel).
The channel is known for its closeness to Fethullah Gülen, the leader of the Gülen movement.
Samanyolu TV was an international TV station, with its headquarters in Istanbul. On 30 April 2016, its license was revoked and the channel closed by the Radio and Television Supreme Council due to alleged links with the Gülen Movement following the 2016 Turkish coup d'état attempt. It was also removed from Türksat. After this, Samanyolu Haber TV will not return along with Samanyolu TV until further notice.
References
External links
Companies formerly affiliated with the Gülen movement
Defunct television channels in Turkey
Mass media shut down in the 2016 Turkish purges
Turkish-language television stations
Television channels and stations established in 2007
Television channels and stations disestablished in 2016
2007 establishments in Turkey
2016 disestablishments in Turkey |
https://en.wikipedia.org/wiki/Annie%20Ant%C3%B3n | Annie Antón is an academic and researcher in the fields of computer science, mathematical logic, and bioinformatics.
She is a professor in the School of Interactive Computing at Georgia Tech, within its College of Computing. She is the founder and director of ThePrivacyPlace.org, a research center devoted to issues of privacy protection in information systems. She has also held advisory positions in industry and government.
Antón served as chair of the School of Interactive Computing from 2012 to 2017. From 1998 to 2012, Antón served as a professor of software engineering at North Carolina State University.
Early life and education
Antón is a Cuban American. She attended St. Pius X Catholic High School in Atlanta. Despite having dyslexia and attention deficit disorder, she continued on to college, eventually receiving her B.S., M.S. and Ph.D. degrees in computer science from the College of Computing at the Georgia Institute of Technology, finishing in 1997. She was active in several student organizations, including as a student member of the Georgia Tech National Advisory Board and was an honorary member of the ANAK Society.
Career
After a year on the faculty of the University of South Florida, Professor Antón joined the faculty at North Carolina State University in 1998. There, her research and teaching interests were in software engineering (especially requirements engineering), information security, privacy, and public policy. In 2012, Professor Antón left NCSU to become Chair of Georgia Tech's School of Interactive Computing.
Antón is the founder and director of ThePrivacyPlace.org, a research group of students and faculty at NCSU, Georgia Tech, and Purdue University. She is leading this group in the development of technology to assist practitioners and policymakers in meeting the challenge of eliciting and expressing policies (a form of requirements). These tools help ensure that privacy policies are aligned with the software systems that they govern.
Boards and advisory positions
2003–2005 Microsoft Research University Relations Advisory Board
2003–present ACM U.S. Public Policy Committee
2005–2012 Member of executive committee
2008 Co-Vice Chair of executive committee
2011–2012 Vice Chair of executive committee
2004–2005 IDA/DARPA Defense Science Study Group
2005–2009 NSF CISE Advisory Council
2005–2007 CRA Committee on the Status of Women in Computing Research
2006–2012 Board of Directors of the Computing Research Association
2006-2012 U.S. Department of Homeland Security Data Privacy and Integrity Advisory Committee (DPIAC)
2006–present Intel Corporation Special Topics External Review Board
2007–2010 Georgia Tech Alumni Association Board of Trustees
2008–present Future of Privacy Forum Advisory Board
2012–present National Academy of Sciences Future Research Goals and Directions for Foundational Science in Cybersecurity
2014–present CRA-CCC Privacy by Design Workshop Organizing Committee
2016–present NIST In |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.