source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Torch%20Computers
Torch Computers Ltd was a computer hardware company with origins in a 1982 joint venture between Acorn Computers and Climar Group that led to the development of the Communicator or C-series computer, a system based on the BBC Micro with a Z80 second processor and integral modem, intended as a viewdata terminal. Establishing itself in Great Shelford, near Cambridge, UK, the company became well known for its computer peripherals for the VIC-20 and BBC Micro. Torch produced an expansion unit originally developed by Arfon Microelectronics for the VIC-20, having acquired Arfon, and several second processor units for the BBC Micro, many with integrated floppy disk or hard disk drives. History Arfon acquisition and financing Arfon Microelectronics was a producer of a cartridge expansion system for the VIC-20 and a speech generator expansion for the VIC-20 and other microcomputers. Arfon had been founded by Kerr Borland, former North American Semi managing director, in Caernarfon, North Wales, around the end of 1980 with assistance from the Welsh Development Agency. Towards the end of 1982, Torch acquired the assets of Arfon, taking on some of the "defunct" company's staff. This deal secured a reported quarter of a million pound investment from the Welsh Development Agency. Other shareholders included Newmarket (Venture Capital) and Bell Nominees. GEC acquisition plans and refinancing During 1983, Torch had been set to be acquired by GEC in a deal that would have initially involved a payment covering the acquisition of 76 percent of the company from its existing shareholders as well as providing additional product development and manufacturing finance. GEC had sought to own Torch entirely and to incorporate it within its own operations as a subsidiary, but such plans met opposition from Torch and its employees who had prized the "young, independent and innovative" nature of the company. With the abandonment of this acquisition, the company was refinanced by its shareholders for £1 million and two of its directors resigned, one of them being founder Martin Vlieland-Boddy who later established a company called Data Technologies, developing the product that would eventually be sold by Torch as the Graduate. Acorn Computers acquisition plans In 1984, Acorn Computers announced an initial agreement to acquire Torch, apparently initiated by discussions from August 1983 on Torch's plans to sell Unix-based products and the potential for cooperation in selling into the US market. The takeover was supposed to have been finalised by June 1984, with Torch effectively becoming "effectively the business arm" of Acorn. Acorn and Torch had previously had "close ties" with plans for Torch to be "the business arm" of Acorn, but policy disagreements had led to the relationship being limited to Acorn supplying BBC Micro boards to Torch under contract for products such as the C-series. Commentators noted the duplication between Acorn and Torch product lines post-ac
https://en.wikipedia.org/wiki/Least-angle%20regression
In statistics, least-angle regression (LARS) is an algorithm for fitting linear regression models to high-dimensional data, developed by Bradley Efron, Trevor Hastie, Iain Johnstone and Robert Tibshirani. Suppose we expect a response variable to be determined by a linear combination of a subset of potential covariates. Then the LARS algorithm provides a means of producing an estimate of which variables to include, as well as their coefficients. Instead of giving a vector result, the LARS solution consists of a curve denoting the solution for each value of the L1 norm of the parameter vector. The algorithm is similar to forward stepwise regression, but instead of including variables at each step, the estimated parameters are increased in a direction equiangular to each one's correlations with the residual. Pros and cons The advantages of the LARS method are: It is computationally just as fast as forward selection. It produces a full piecewise linear solution path, which is useful in cross-validation or similar attempts to tune the model. If two variables are almost equally correlated with the response, then their coefficients should increase at approximately the same rate. The algorithm thus behaves as intuition would suggest, and also is more stable. It is easily modified to produce efficient algorithms for other methods producing similar results, like the lasso and forward stagewise regression. It is effective in contexts where p ≫ n (i.e., when the number of predictors p is significantly greater than the number of points n) The disadvantages of the LARS method include: With any amount of noise in the dependent variable and with high dimensional multicollinear independent variables, there is no reason to believe that the selected variables will have a high probability of being the actual underlying causal variables. This problem is not unique to LARS, as it is a general problem with variable selection approaches that seek to find underlying deterministic components. Yet, because LARS is based upon an iterative refitting of the residuals, it appears to be especially sensitive to the effects of noise. This problem is discussed in detail by Weisberg in the discussion section of the Efron et al. (2004) Annals of Statistics article. Weisberg provides an empirical example based upon re-analysis of data originally used to validate LARS that the variable selection appears to have problems with highly correlated variables. Since almost all high dimensional data in the real world will just by chance exhibit some degree of collinearity across at least some variables, the problem that LARS has with correlated variables may limit its application to high dimensional data. Algorithm The basic steps of the Least-angle regression algorithm are: Start with all coefficients equal to zero. Find the predictor most correlated with . Increase the coefficient in the direction of the sign of its correlation with . Take residuals along the way. Stop
https://en.wikipedia.org/wiki/List%20of%20Ecma%20standards
This is a list of standards published by Ecma International, formerly the European Computer Manufacturers Association. ECMA-1 – ECMA-99 ECMA-100 – ECMA-199 ECMA-114 – 8-Bit coded character set, Latin/Arabic (same as ISO/IEC 8859-6) ECMA-118 – 8-Bit coded character set, Latin/Greek (same as ISO/IEC 8859-7) ECMA-119 – CD-ROM file system (later adopted as ISO 9660:1988) ECMA-120 – Data Interchange on 12,7 mm 18-Track Magnetic Tape Cartridges (ISO 9661) ECMA-121 – 8-Bit coded character set, Latin/Hebrew (same as ISO/IEC 8859-8) ECMA-125 – 3½-inch floppy disk (also ISO/IEC 9529) ECMA-128 – 8-Bit coded character set, Latin Alphabet No 5 (same as ISO/IEC 8859-9) ECMA-130 – CD-ROM "Yellow Book" format (same as ISO/IEC 10149) ECMA-133 – Private Integrated Services Network (PISN) – Reference Configuration for PISN Exchanges (PINX) (ISO/IEC 11579-1/ETSI ETS 300 475-1) ECMA-139 – 4 mm Digital Data Storage (DDS) cartridges (same as ISO/IEC 10777) ECMA-142 – Private Integrated Services Network (PISN) - Circuit Mode 64kbit/s Bearer Services - Service Description, Functional Capabilities and Information Flows (BCSD) (ISO/IEC 11574/ETSI EN 300 171) ECMA-143 – Private Integrated Services Network (PISN) - Circuit Mode Bearer Services - Inter-Exchange Signalling Procedures and Protocol (QSIG-BC) (ISO/IEC 11572/ETSI EN 300 172) ECMA-144 – 8-Bit coded character set (same as ISO/IEC 8859-10) (3rd edition Dec 2000) ECMA-145 – 8 mm Wide Magnetic Tape Cartridge for Information Interchange – Helical Scan Recording (ISO/IEC 11319) ECMA-146 – 4 mm DAT data cartridges (same as ISO/IEC 11321) ECMA-147 – Data Interchange on 90 mm Flexible Disk Cartridges using MFM Recording at 31 831 ftprad on 80 Tracks on Each Side – ISO Type 303 (ISO/IEC 10994) ECMA-148 – Private Integrated Services Network (PISN) - Specification, Functional Model and Information Flows – Identification Supplementary Services (ISSD) (ISO/IEC 14136/ETSI ETS 300 173) ECMA-149 – Portable Common Tool Environment (PCTE) - Abstract Specification (ISO/IEC 13719-1) ECMA-150 – 3,81 mm Wide Magnetic Tape Cartridge for Information Interchange - Helical Scan Recording – DDS-DC Format using 60 m and 90 m Length Tapes (ISO/IEC 11557) ECMA-151 – Data Compression for Information Interchange - Adaptive Coding with Embedded Dictionary – DCLZ Algorithm (ISO/IEC 11558) ECMA-152 – Data Interchange on 12,7 mm 18-Track Magnetic Tape Cartridges - Extended Format (ISO/IEC 11559) ECMA-153 – Information Interchange on 130 mm Optical Disk Cartridges of the Write Once, Read Multiple (WORM) Type, using the Magneto-Optical Effect (ISO/IEC 11560) ECMA-154 – Data Interchange on 90 mm Optical Disk Cartridges, Read only and Rewritable, M.O. (ISO/IEC 10090) ECMA-155 – Private Integrated Services Networks – Addressing (ISO/IEC 11571/ETSI EN 300 189) ECMA-156 – Private Telecommunication Networks (PTN) – Signalling at the S Reference Point – Generic Keypad Protocol for the Support of Supplementary Services (SSIG-KP) (ETS
https://en.wikipedia.org/wiki/Symantec%20Endpoint%20Protection
Symantec Endpoint Protection, developed by Broadcom Inc., is a security software suite that consists of anti-malware, intrusion prevention and firewall features for server and desktop computers. It has the largest market-share of any product for endpoint security. Version history The first release of Symantec Endpoint Protection was published in September 2007 and was called version 11.0. Endpoint Protection is the result of a merger of several security software products, including Symantec Antivirus Corporate Edition 10.0, Client Security, Network Access Control, and Sygate Enterprise Edition. Endpoint Protection also included new features. For example, it can block data transfers to unauthorized device types, such as USB flash drives or Bluetooth devices. At the time, Symantec Antivirus Corporate Edition was widely criticized as having become bloated and unwieldy. Endpoint Protection 11.0 was intended to address these criticisms. The disk footprint of Symantec Corporate Edition 10.0 was almost 100 MB, whereas Endpoint Protection's was projected to be 21 MB. In 2009, Symantec introduced a managed service, whereby Symantec staff deploy and manage Symantec Endpoint Protection installations remotely. A Small Business Edition with a faster installation process was released in 2010. In February 2011, Symantec announced version 12.0 of Endpoint Protection. Version 12 incorporated a cloud-based database of malicious files called Symantec Insight. Insight was intended to combat malware that generates mutations of its files to avoid detection by signature-based anti-malware software. In late 2012, Symantec released version 12.1.2, which supports VMware vShield. A cloud version of Endpoint Protection was released in September 2016. This was followed by version 14 that November. Version 14 incorporates machine learning technology to find patterns in digital data that may be indicative of the presence of a cyber-security threat. It also incorporates memory exploit mitigation and performance improvements. Features Symantec Endpoint Protection is a security software suite that includes intrusion prevention, firewall, and anti-malware features. According to SC Magazine, Endpoint Protection also has some features typical of data loss prevention software. It is typically installed on a server running Windows, Linux, or macOS. As of 2018, Version 14 is the only currently-supported release. Endpoint Protection scans computers for security threats. It is used to prevent unapproved programs from running, and to apply firewall policies that block or allow network traffic. It attempts to identify and block malicious traffic in a corporate network or coming from a web browser. It uses aggregate information from users to identify malicious software. As of 2016, Symantec claims to use data from 175 million devices that have installed Endpoint Security in 175 countries. Endpoint Protection has an administrative console that allows the IT department to modify secur
https://en.wikipedia.org/wiki/List%20of%20Argentine%20films%20of%202007
A list of films produced in Argentina in 2007: See also 2007 in Argentina External links and references Argentine films of 2007 at the Internet Movie Database 2007 Argentine Films
https://en.wikipedia.org/wiki/Trams%20in%20Mykolaiv
The Mykolaiv tram network is the part of the public transportation system that serves Mykolaiv, Ukraine. External links The Mykolaiv tram on Google Maps Tram Tram transport in Ukraine Mykolaiv
https://en.wikipedia.org/wiki/History%20of%20personal%20computers
The history of the personal computer as a mass-market consumer electronic device began with the microcomputer revolution of the 1970s. A personal computer is one intended for interactive individual use, as opposed to a mainframe computer where the end user's requests are filtered through operating staff, or a time-sharing system in which one large processor is shared by many individuals. After the development of the microprocessor, individual personal computers were low enough in cost that they eventually became affordable consumer goods. Early personal computers – generally called microcomputers – were sold often in electronic kit form and in limited numbers, and were of interest mostly to hobbyists and technicians. Etymology There are several competing claims as to the origins of the term "personal computer". Yale Law School librarian Fred Shapiro notes an early published use of the phrase in a 1968 Hewlett-Packard advertisement for a programmable calculator, which they called "The new Hewlett-Packard 9100A personal computer." Other claims include computer pioneer Alan Kay's purported use of the term in a 1972 paper, Whole Earth Catalog publisher Stewart Brand's usage in a 1974 book, MITS co-founder Ed Roberts usage in 1975, and Byte magazine's May 1976 usage of "[in] the personal computing field" in its first edition. In 1975 Creative Computing defined the personal computer as a "non-(time)shared system containing sufficient processing power and storage capabilities to satisfy the needs of an individual user." Overview The history of the personal computer as mass-market consumer electronic devices effectively began in 1977 with the introduction of microcomputers, although some mainframe and minicomputers had been applied as single-user systems much earlier. A personal computer is one intended for interactive individual use, as opposed to a mainframe computer where the end user's requests are filtered through operating staff, or a time sharing system in which one large processor is shared by many individuals. After the development of the microprocessor, individual personal computers were low enough in cost that they eventually became affordable consumer goods. Early personal computers – generally called microcomputers – were sold often in electronic kit form and in limited numbers, and were of interest mostly to hobbyists and technicians. Mainframes, minicomputers, and microcomputers Computer terminals were used for time sharing access to central computers. Before the introduction of the microprocessor in the early 1970s, computers were generally large, costly systems owned by large corporations, universities, government agencies, and similar-sized institutions. End users generally did not directly interact with the machine, but instead would prepare tasks for the computer on off-line equipment, such as card punches. A number of assignments for the computer would be gathered up and processed in batch mode. After the job had completed, us
https://en.wikipedia.org/wiki/Base%20One%20Foundation%20Component%20Library
The Base One Foundation Component Library (BFC) is a rapid application development toolkit for building secure, fault-tolerant, database applications on Windows and ASP.NET. In conjunction with Microsoft's Visual Studio integrated development environment, BFC provides a general-purpose web application framework for working with databases from Microsoft, Oracle, IBM, Sybase, and MySQL, running under Windows, Linux/Unix, or IBM iSeries or z/OS. BFC includes facilities for distributed computing, batch processing, queuing, and database command scripting, and these run under Windows or Linux with Wine. Design BFC is based on a database-centric architecture whose cross-DBMS data dictionary plays a central role in supporting data security, validation, optimization, and maintainability features. Some of BFC’s core technologies are based on underlying U.S. patents in database communication and high precision arithmetic. BFC supports a unique model of large scale, distributed computing. This is intended to reduce the vulnerability and performance impact of either depending on a centralized process to distribute tasks or communicating directly between nodes through messages. Deutsche Bank made use of the initial version of BFC to build its securities' custody system and is one of the earliest successful examples of commercial grid computing. BFC implements a grid computing architecture that revolves around the model of a "virtual supercomputer" composed of loosely coupled "batch job servers". These perform tasks that are specified and coordinated through database-resident control structures and queues. The model is virtual, as it uses the available processing power and resources of ordinary servers and database systems, which can also continue to work in their previous roles. The result is termed a virtual supercomputer because it presents itself as a single, unified computational resource that can be scaled both in capacity and processing power. History BFC was originally developed by Base One International Corp., funded by projects done for Marsh & McLennan and Deutsche Bank that started in the mid-1990s. Beginning in 1994, Johnson & Higgins (later acquired by Marsh & McLennan), built Stars, an insurance risk management system, using components known as ADF (Application Development Framework). ADF was the predecessor of BFC and was jointly developed by Johnson & Higgins and Base One programmers, with Base One retaining ownership of ADF, and Johnson & Higgins retaining all rights to Stars risk management software. In 2014, BFC was acquired by Content Galaxy Inc., whose video publishing service was built with BFC. The name "BFC" was a play on MFC Microsoft Foundation Classes, which BFC extended through Visual C++ class libraries to facilitate the development of large-scale, client/server database applications. Developers can incorporate BFC components into web and Windows applications written in any of the major Microsoft programming languages (
https://en.wikipedia.org/wiki/Raffy%20Tima
Rufino Dompao Tima Jr. (born January 7, 1975), popularly known as Raffy Tima (), is a Filipino journalist, producer and presenter. He is currently working in GMA Network and its affiliate, GMA News TV (now GTV), he spanned over 23 years since the working of his current network. Early life Raffy Tima was born as Rufino Dompao Tima Jr. on January 7, 1975, in Tabuk, Kalinga. He moved in Pasig and Quezon City for focused on news television after graduated in college. He finished the secondary education in San Marcelino High School, and his tertiary education in UP Diliman from 1st year to 2nd year, but he transferred to Trinity University of Asia from 3rd year until his graduation, with Bachelor of Arts in Mass Communication. Career Before his joining IBC and GMA News (now GMA Integrated News), he was a voice-over for the Philippine variety show, That's Entertainment. Tima was one of GMA Network's main reporters during the 2000 to 2004 series of kidnappings by the Abu Sayyaf Group, an Islamic extremist group in southern Mindanao, and the all-out war waged by the Armed Forces of the Philippines against the Islamic separatist Moro Islamic Liberation Front in Central Mindanao. Tima has also covered the War in Afghanistan in 2001 and Iraq in 2004. A recipient of numerous commendations including most outstanding news producer in 2004 for his coverage of that year's general elections, Tima is currently a senior producer for GMA Integrated News, an anchor on GMA News TV (now GTV)'s noontime programme Balitanghali (now Balita Ko) with Pia Arcangel (now Connie Sison), and presenter on the public affairs show, 100% Pinoy!. He is likewise one of the first presenters of Reporter's Notebook as well as on i-Witness, which won the Peabody Award. Portrayals in media Tima was featured in an episode of GMA News TV's drama anthology Wagas on August 9, 2014, before the proposal of set from Amaya. JC Tiuseco starred the role of Tima. Personal life Tima is married to fellow GMA News Reporter Mariz Umali on December 8, 2012. On January 1, 2012, celebrate the New Year's Day, Tima proposes to Umali in the party after two years as a couple. According to the story of television drama series, Wagas, Tima was set of epic fantaserye Amaya before proposal to her. Filmography References External links Raffy Tima on GMA News Online 1975 births Living people Filipino television journalists IBC News and Public Affairs people GMA Network personalities GMA Integrated News and Public Affairs people
https://en.wikipedia.org/wiki/KWTW
KWTW (88.5 FM) is a radio station broadcasting a Christian Contemporary & Talk format, licensed to Bishop, California, United States. KWTW is known as The Living Proof Radio Network, which is a ministry of Calvary Chapel in Bishop. The station is currently owned by Westside Christian Fellowship A.V. The Living Proof Radio Network, in addition to KWTW 88.5 Bishop, is also broadcast on KWTD 91.9 FM in Ridgecrest, California. External links Bishop, California WTW Calvary Chapel Association 2002 establishments in California Radio stations established in 2002
https://en.wikipedia.org/wiki/3000%20series
3000 series may refer to: Computers CDC 3000 series computers manufactured by Control Data Corporation Radeon HD 3000 series video cards developed by ATI Japanese train types Chichibu Railway 3000 series EMU Chikuho Electric Railroad 3000 series electric multiple unit operated on the Chikuhō Electric Railroad Line Choshi Electric Railway 3000 series EMU Fukuoka Subway 3000 series EMU Hakone Tozan 3000 series EMU Hankyu 3000 series EMU, operated by Hankyu Railway Izukyu 3000 series EMU Keihan 3000 series EMU Keio 3000 series EMU Keisei 3000 series EMU Nagoya Municipal Subway 3000 series EMU Nishitetsu 3000 series EMU Odakyu 3000 series EMU Odakyu 3000 series SE EMU Seibu 3000 series EMU Shizuoka Railway A3000 series EMU Tobu 3000 series EMU Tokyu 3000 series EMU TRTA 3000 series EMU Yokohama Municipal Subway 3000 series EMU South Korean train types Seoul Metro 3000 series Taiwanese train types EMU3000 series Other Dell Inspiron 3000 series laptop computers See also 3000 (disambiguation)
https://en.wikipedia.org/wiki/Winter%20Cicada
is a Japanese anime OVA loosely based on Youka Nitta's manga series . The U.S. broadcast rights to the OVA have been licensed to Logo, MTV Networks' LGBT cable channel, and premiered on October 31, 2008. Synopsis This three part yaoi story spans the war torn Meiji era when the Japanese turned from a Shogunate to Imperial rule and entered trade with the rest of the world (1862–1869). While the story unfolds historical dates and important figures are given while the characters give even more bits and pieces of this period during dialog. Episode One: "Edo Love Song" starts in 1862, second year of the Bunkyuu Era, in Shinagawa Gotenyama during the Expulsion of Foreigners movement started by the Chōshū (Choushuu) clan of which Touma Kusaka is a member. Kusaka differs from his clan believing in peace and opening Japan up to foreigners where it can do trade and stand with equal footing on the world stage, the Open the Country movement. While trying to stop other Chōshū clan members from setting fire to the British Embassy, Kusaka is confronted by a Bakufu (Shogunate) samurai who helps him and a comrade, Aizawa, escape from the authorities. Years later, while trying to find a school that will teach him English despite his clan's political stance, Kusaka once again meets the samurai who had saved his life. No longer in the employ of his Town Magistrate father, Keiichirou Akizuki goes to English school at the Nakahama Private School. Recognizing each other, Akizuki eventually offers to teach Kusaka English. Having been raised in an upper-class home, Akizuki takes pleasure in learning more about the common class lifestyle that Kusaka has always led while they learn English in secret as their clans cannot see them together without creating conflict. Despite their precautions, one of the Chōshū sees them and Kusaka has to stop meeting with Akizuki. Episode Two: "Record of Ezo War" starts with Kusaka thinking about cutting ties with his clan when the Head Administrator, Sufu Masanosuke, offers to send him to London to learn about the West. Before leaving, Kusaka meets with Akizuki one last time during a sunset and they declare their love for each other by kissing and having passionate sweaty sex in a meadow near a riverbank. They consummate their relationship. While Kusaka is in England, Akizuki gains the leadership of his clan and its immediate association with the Shogun. After four years, Kusaka returns to Japan and receives a high ranking post in the Imperial army. It is during this time that Japan is in the midst of the greatest civil war Japan has known, the Boshin War, with Kusaka on the Satsuma-Chōshū (Imperial) side and Akizuki on the Bakufu (Shogunate) side. During one of the last battles, Kusaka finds Akizuki about to commit seppuku after having lost a leg to cannon fire. Upon being seen by one of his comrades aiding Akizuki, Kusaka kills the man, leaving his lover in shock. Episode Three: "Tokyo Tragedy" starts four years later, w
https://en.wikipedia.org/wiki/PROLINNOVA
Promoting Local innovation in ecologically oriented agriculture and NRM, known as PROLINNOVA, is an NGO-initiated international learning network to promote local innovation in ecologically oriented agriculture and Natural resource management. It is a "Global Partnership Programme" under the umbrella of the Global Forum on Agricultural Research (GFAR). The focus of PROLINNOVA is on recognising the dynamics of indigenous knowledge and enhancing capacities of farmers (including forest dwellers, pastoralists and fisherfolk) to adjust to change – to develop their own site-appropriate systems and institutions of resource management so as to gain food security, sustain their livelihoods and safeguard the environment. The essence of sustainability lies in the capacity to adapt. The programme builds on and scales up farmer-based approaches to development that start with discovering how farmers do informal experimentation to develop and test new ideas for better use of natural resources. Understanding the rationale behind local innovation transforms how research and extension agents view local people. This experience stimulates interest on both sides to enter into joint action. Local ideas are further developed in a participatory process that integrates IK and scientific knowledge. Joint action and analysis lead to mutual learning. There are 19 multi-stakeholder country platforms involved in the PROLINNOVA network: Bolivia, Peru, Ecuador, Kenya, Mozambique, Mali, Senegal, Ethiopia, Nigeria, Ghana, Uganda, Nepal, Cambodia, South Africa, Nigeria, Niger, Sudan, Cameroon and Tanzania. Prolinnova country-level activities are supported by an international support team, composed of ETC-AgriCulture (Netherlands), International Institute of Rural Reconstruction (IIRR, Philippines) and IED Afrique (Senegal). PROLINNOVA Cambodia Cambodia was involved at the inception phase and has been a member of Prolinnova since 2004. There are 20 institutions participating across the country, including Cambodia's largest agricultural NGO, CEDAC. References The Communication Initiative Network ETC Ecoculture External links Official website Agricultural organizations
https://en.wikipedia.org/wiki/Device%20fingerprint
A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device. Device fingerprints can be used to fully or partially identify individual devices even when persistent cookies (and zombie cookies) cannot be read or stored in the browser, the client IP address is hidden, or one switches to another browser on the same device. This may allow a service provider to detect and prevent identity theft and credit card fraud, but also to compile long-term records of individuals' browsing histories (and deliver targeted advertising or targeted exploits) even when they are attempting to avoid tracking – raising a major concern for internet privacy advocates. History Basic web browser configuration information has long been collected by web analytics services in an effort to measure real human web traffic and discount various forms of click fraud. Since its introduction in the late 1990s, client-side scripting has gradually enabled the collection of an increasing amount of diverse information, with some computer security experts starting to complain about the ease of bulk parameter extraction offered by web browsers as early as 2003. In 2005, researchers at the University of California, San Diego showed how TCP timestamps could be used to estimate the clock skew of a device, and consequently to remotely obtain a hardware fingerprint of the device. In 2010, Electronic Frontier Foundation launched a website where visitors can test their browser fingerprint. After collecting a sample of 470161 fingerprints, they measured at least 18.1 bits of entropy possible from browser fingerprinting, but that was before the advancements of canvas fingerprinting, which claims to add another 5.7 bits. In 2012, Keaton Mowery and Hovav Shacham, researchers at University of California, San Diego, showed how the HTML5 canvas element could be used to create digital fingerprints of web browsers. In 2013, at least 0.4% of Alexa top 10,000 sites were found to use fingerprinting scripts provided by a few known third parties. In 2014, 5.5% of Alexa top 10,000 sites were found to use canvas fingerprinting scripts served by a total of 20 domains. The overwhelming majority (95%) of the scripts were served by AddThis, which started using canvas fingerprinting in January that year, without the knowledge of some of its clients. In 2015, a feature to protect against browser fingerprinting was introduced in Firefox version 41, but it has been since left in an experimental stage, not initiated by default. The same year a feature named Enhanced Tracking Protection was introduced in Firefox version 42 to protect against tracking during private browsing by blocking scripts from third par
https://en.wikipedia.org/wiki/Synthetic%20file%20system
In computer science, a synthetic file system or a pseudo file system is a hierarchical interface to non-file objects that appear as if they were regular files in the tree of a disk-based or long-term-storage file system. These non-file objects may be accessed with the same system calls or utility programs as regular files and directories. The common term for both regular files and the non-file objects is node. The benefit of synthetic file systems is that well-known file system semantics can be reused for a universal and easily implementable approach to interprocess communication. Clients can use such a file system to perform simple file operations on its nodes and do not have to implement complex message encoding and passing methods and other aspects of protocol engineering. For most operations, common file utilities can be used, so even scripting is quite easy. This is commonly known as everything is a file and is generally regarded to have originated from Unix. Examples /proc filesystem In the Unix-world, there is commonly a special filesystem mounted at /proc. This filesystem is implemented within the kernel and publishes information about processes. For each process, there is a directory (named by the process ID), containing detailed information about the process: status, open files, memory maps, mounts, etc. /proc first appeared in Unix 8th Edition, and its functionality was greatly expanded in Plan 9 from Bell Labs. Linux /sys filesystem The /sys filesystem on Linux complements /proc, by providing a lot of (non-process related) detailed information about the in-kernel status to userspace. More traditional Unix systems locate this information in sysctl calls. ObexFS ObexFS is a FUSE-based filesystem that provides access to OBEX objects via a filesystem. Applications can work on remote objects via the OBEX protocol as if they were simply (local) files. Plan 9 file servers On the Plan 9 from Bell Labs operating system family, the concept of 9P synthetic filesystem is used as a generic IPC method. Contrary to most other operating systems, Plan 9's design is heavily distributed: while in other OS worlds, there are many (and often large) libraries and frameworks for common things, Plan 9 encapsulates them into fileservers. The most important benefit is that applications can be much simpler and that services run network and platform agnostic - they can reside on virtually any host and platform in the network, and virtually any kind of network, as long the fileserver can be mounted by the application. Plan 9 drives this concept expansively: most operating system services, e.g. hardware access and networking stack are presented as fileservers. This way it is trivial to use these resources remotely (e.g. one host directly accessing another host's block devices or network interfaces) without the need of additional protocols. Other implementations of the 9P file system protocol also exists for many other systems and environments. Embedded
https://en.wikipedia.org/wiki/UNIK
The University Graduate Center (UNIK) is a research foundation at Kjeller in Norway. UNIK has four focus areas Network, Information Security and Signalprocessing for Communication, Electronics and Photonics Cybernetics and Industrial Mathematics Energy and the Environment UNIK was founded in 1987 in order to foster the co-operation between the research institutes at Kjeller and to support master and PhD education. UNIK has a supplementary education as compared to the University of Oslo UiO and the Norwegian University of Science and Technology NTNU, which is based on the collaboration with the Research Institutes at Kjeller. The core founding members were FFI, IFE, Telenor R&I, and UiO. NTNU joined in 1995. Focus of UNIK is towards applications, thus the strong relation to the Institutes at Kjeller and other relevant industry. UNIK's main cooperation partner today is FFI. Telenor R&I, Kongsberg Defense Communications, Thales and Thrane Norway support education at UNIK through their staff members. In 2007 UNIK started together with IFE and the University College of Akershus (HiAk) a study within Energi and Environment. UNIK is co-located with NORSAR at Kjeller close to Lillestrøm, 25 km east of Oslo. The building hosts the first termination of the ARPANET in Europe, back in 1973. The start of the Internet in Europe and the mobile phone development is closely related to people teaching at UNIK: Pål Spilling, who brought the Internet to Europe Torleiv Maseng, who contributed to the development of GSM Øivind Kure, who influenced the research directions of Telenor as being research director and who is a partner in the Q2S center of excellency at NTNU UNIK's 25 anniversary UNIK celebrated 25 years of higher academic education on Master and Phd level on 22. March 2012 . Vinton Cerf contributed with a video note mentioning the contribution of the people at Kjeller and UNIK in extending the ARPANET outside of the US. External links UNIK Wiki on Research in Wireless Communications NORSAR and the Internet Gambar Unik Universities and colleges in Norway
https://en.wikipedia.org/wiki/Germany%27s%20Next%20Topmodel%20%28season%203%29
Germany's Next Topmodel, Cycle 3 is the third season of the show that was aired on the German television network ProSieben. The show started airing on 28 February 2008 with 120 semi-finalists in the competition, and finished on 5 June 2008. This cycle's tagline as mentioned in the television previews, is "Sie laufen wieder" ("They walk again" – as in to walk the runway). This season was commercially presented by Volkswagen Tiguan. For this season the number of contestants was expanded to 19. The show was hosted by top model Heidi Klum. Vanessa Hegelmaier, who withdrew due to an accident, became an internationally successful topmodel after the show. The winner of the show was 16-year-old Jennifer Hof from Rodgau. The international destinations for this cycle were set in Barcelona, Vienna, Tel Aviv, Los Angeles, New York City and Sydney. Episode summaries Episode 1: Das große Casting in Köln Original airdate: 28 February 2008 Out of 18.217 applicants, 120 girls from all over Germany, Austria and Switzerland came to Cologne to convince the judges of their qualities as Germany's next top model. The young women had to walk the runway either in a favourite outfit or bathing suit. Moreover, they undertook small challenges: Some had to sing, dance or scream in wrath, others were told to advertise a shampoo or even expose the preferences of a cleansing agent for toilets. Meanwhile, the other contestants had to show three different emotions (anger, pain, and happiness) in a one-minute photo shoot. The judges narrowed down the competition to fifty girls, who flew to Barcelona in a surprise trip the next morning. They were booked for the BREAD & BUTTER – tradeshow for selected brands festival on 16 January 17 January, and 18 January 2008. The show was presented by Phillipp Plein, a well-known designer, on the same evening. As most of the girls had not been very experienced in doing a runway show, some of them had severe problems on the catwalk which lead to several pitiable sights. In the end thirty girls reached the next round. Featured photographer: Robertino Nicolic Special guests: Boris Entrup & Philipp Plein Episode 2: Die Sedcard Original airdate: 6 March 2008 Featured photographers: Stephan Pick, Oliver Schulze Special guest: Petra Gessulat Guest judge: Petra Gessulat Episode 3: Erster Zoff im Modelhaus Original airdate: 13 March 2008 The 19 finalists are taken to their first destination in Austria to do a photo shoot in front of a helicopter. However, before that judge Rolf Scheider reports about several complaints by the hotel organisation about how the girls left their rooms and asks the abusers to reveal themselves in front of the entire group. Gisele, Sarah and Gina-Lisa admit to having smoked in the rooms but who has drunk all the alcohol from the mini-bar remains a secret. Scheider promises consequences for everyone. At the photo shoot several girls have trouble with the wind like Gina-Lisa whose dress is constantly soaring up leavi
https://en.wikipedia.org/wiki/68th%20Network%20Warfare%20Squadron
The 68th Network Warfare Squadron is part of the United States Air Force. It was previously called the 68th Information Operations Squadron, but as of mid-2008, the name changed to the 68th Network Warfare Squadron. Until 2011, the 68 NWS was assigned to Brooks City-Base. Due to the 2005 Base Realignment and Closure Commission all Air Force units left prior to September 2011. The 68 NWS relocated to Lackland AFB in June 2011. Lineage Constituted 958th Signal Radio Intelligence Company, Aviation, on 9 Oct 1942. Activated on 1 Nov 1942. Redesignated 8th Radio Squadron, Mobile (J) on 19 Feb 1944 Redesignated 8th Radio Squadron, Mobile on 14 Nov 1946 Inactivated on 8 May 1955 Disbanded on 15 Jun 1983 Reconstituted, and consolidated (1 Oct 1993) with the 6906th Security Squadron, which was designated, and activated, on 1 Nov 1977 Redesignated 6906th Electronic Security Squadron on 1 Aug 1979 Redesignated 68th Intelligence Squadron on 1 Oct 1993 Redesignated 68th Information Operations Squadron on 1 Aug 2000. Redesignated 68th Network Warfare Squadron on xx Xxx 2008. Location Drew Field, FL, 1 Nov 1942; Camp Pinedale, CA, 24 Jan 1943-Oct 1944; Guam, 17 Oct 1944-6 Nov 1945; Washington, DC, 6 Nov 1945; Vint Hill Farms Station, Warrenton, VA, 5 Mar 1946; Brooks AFB, TX, 23 Feb 1949; Kelly AFB, TX, 1 Aug 1953; Brooks AFB, TX 22 Mar-8 May 1955. Brooks AFB [later, Brooks City-Base], TX, 1 Nov 1977-2011 Lackland AFB, 2011–present. See also List of cyber warfare forces Military units and formations in Texas Information Operations 0068
https://en.wikipedia.org/wiki/Davos%20%28disambiguation%29
Davos is a municipality in Switzerland. Davos also may refer to: Davos (album), a 2015 album by Computer Magic Davos (comics), a supervillain in Marvel Comics' Iron Fist comics Davos Platz, a village of Davos Davos Seaworth, a fictional character created by George R. R. Martin, appearing in A Song of Ice and Fire HC Davos, a professional Swiss hockey club in Davos, Switzerland Lake Davos, a lake in Davos World Economic Forum, which hosts an annual meeting in Davos, Switzerland, also known as Davos Forums See also Davros, a character in the British television series Doctor Who
https://en.wikipedia.org/wiki/Multi%20Protocol%20File%20System
The Multi Protocol File System (MPFS) is a multi-path network filesystem technology developed and sold by EMC Corporation. MPFS is intended to allow hundreds to thousands of client computer nodes to access shared computer data with higher performance than conventional NAS file-sharing protocols such as NFS. Description MPFS technology is intended for HPC (High Performance Computing) environments in which multiple compute nodes require concurrent access to data sets. This technology can be used to store and access data for grid computing, where the individual computing power of many systems is combined to perform a single process. Example uses include processing geological data, voice recognition datasets, and modal processing. Virtualized computing environments will also benefit from high performance shared storage. MPFS consists of an agent on the client system and a compatible NAS storage system. The client agent splits the data and meta data for the file being requested. This is done using an FMP (File Mapping Protocol). Requests for the data and its location are sent over conventional NFS to the NAS system. Block data is sent and retrieved directly from the storage device via iSCSI or Fibre Channel. Retrieving data directly from the storage device increases performance by eliminating the file system and protocol overhead associated with NFS or SMB. The MPFS protocol was developed by EMC for use in NAS storage environments utilizing EMC Celerra and back end storage environments such as the EMC CLARiiON, EMC VNX and Symmetrix. References Further reading File sharing
https://en.wikipedia.org/wiki/IOS
iOS (formerly iPhone OS) is a mobile operating system developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also includes the system software for iPads (predating iPadOS, which was introduced in 2019) as well as on the iPod Touch devices (which were discontinued in mid-2022). It is the world's second-most widely installed mobile operating system, after Android. It is the basis for three other operating systems made by Apple: iPadOS, tvOS, and watchOS. It is proprietary software, although some parts of it are open source under the Apple Public Source License and other licenses. Unveiled in 2007 for the first-generation iPhone, iOS has since been extended to support other Apple devices such as the iPod Touch (September 2007) and the iPad (introduced: January 2010; availability: April 2010). , Apple's App Store contains more than 2.1 million iOS applications, 1 million of which are native for iPads. These mobile apps have collectively been downloaded more than 130 billion times. Major versions of iOS are released annually. The current stable version, iOS 17, was released to the public on September 18, 2023. History In 2005, when Steve Jobs began planning the iPhone, he had a choice to either "shrink the Mac, which would be an epic feat of engineering, or enlarge the iPod". Jobs favored the former approach but pitted the Macintosh and iPod teams, led by Scott Forstall and Tony Fadell, respectively, against each other in an internal competition, with Forstall winning by creating the iPhone OS. The decision enabled the success of the iPhone as a platform for third-party developers: using a well-known desktop operating system as its basis allowed the many third-party Mac developers to write software for the iPhone with minimal retraining. Forstall was also responsible for creating a software development kit for programmers to build iPhone apps, as well as an App Store within iTunes. The operating system was unveiled with the iPhone at the Macworld Conference & Expo on January 9, 2007, and released in June of that year. At the time of its unveiling in January, Steve Jobs claimed: "iPhone runs OS X" and runs "desktop class applications", but at the time of the iPhone's release, the operating system was renamed "iPhone OS". Initially, third-party native applications were not supported. Jobs' reasoning was that developers could build web applications through the Safari web browser that "would behave like native apps on the iPhone". In October 2007, Apple announced that a native Software Development Kit (SDK) was under development and that they planned to put it "in developers' hands in February". On March 6, 2008, Apple held a press event, announcing the iPhone SDK. The iOS App Store was opened on July 10, 2008, with an initial 500 applications available. This quickly grew to 3,000 in September 2008, 15,000 in January 2009, 50,000 in June 2009,
https://en.wikipedia.org/wiki/Microsoft%20Azure%20SQL%20Database
Microsoft Azure SQL Database (formerly known as SQL Azure, SQL Server Data Services, SQL Services, and Windows Azure SQL Database) is a managed cloud database (PaaS) provided as part of Microsoft Azure services. The service handles database management functions for cloud based Microsoft SQL Servers including upgrading, patching, backups, and monitoring without user involvement. Overview Azure SQL Database supports multi-modal storage of structured, semi-structured, and non-relational data As per Microsoft, Azure SQL Database includes built-in intelligence that learns app patterns and adapts them to maximize performance, reliability, and data protection. Key capabilities include: Continuous learning of the host app's data access patterns, adaptive performance tuning, and automatic improvements to reliability and data protection. Scaling on demand. Management and monitoring of multi-tenant apps with isolation benefits of one-customer-per-database. Integration with open source tools such as cheetah (Command-line interface utility), sql-cli, Visual Studio Code, and Microsoft tools like Visual Studio, SQL Server Management Studio, Azure Management Portal, PowerShell, and REST APIs. Data protection with encryption, authentication, limiting user access to the subset of the data, continuous monitoring and auditing to help detect potential threats and provide a record of critical events in case of a breach. Popular use cases Relational data storage for cloud-based applications and websites Business and consumer web and mobile apps Manage databases for multi-tenant apps (software-as-a-service) Quickly create dev and test databases to speed up development cycles Scale production business services quickly and at a known cost Containerize data in the cloud for isolation and security Reduce database administration overhead through increased automation Design Azure SQL Database is built on the foundation of the SQL server database and therefore, kept in sync with the latest version of it by using the common code base. Since the cloud version of the database technology strives to decouple it from the underlying computing infrastructure, it doesn't support some of the context specific T-SQL features available in the traditional SQL server. However, rest of the features are the same with incompatibilities spelled out by Microsoft. Azure SQL Database is also similar to Microsoft's SQL Managed instance offering, with some differences. Timeline 2009 – Service announced 2010 – Service went live 2014 – New version announced and rebranded from Windows Azure to Microsoft Azure 2015 – Major Architectural Revision 2016 – Elastic Pools Introduced 2017 - Azure SQL Database Managed Instance launched 2019 - Introduced Azure SQL Database Hyperscale, Serverless, and Instance Pools Deployment Models Azure SQL Database is offered in two deployment models, as a Standalone database or an Elastic database pool (with shared storage and compute resources).
https://en.wikipedia.org/wiki/PVRTC
PVRTC (PowerVR Texture Compression) and PVRTC2 are a family of lossy, fixed-rate texture compression formats used in PowerVR's MBX (PVRTC only), SGX and Rogue technologies. The PVRTC algorithm is documented in Simon Fenney's paper "Texture Compression using Low-Frequency Signal Modulation" that was presented at Graphics Hardware 2003. These differ from block-based texture formats such as S3TC and Ericsson Texture Compression (ETC) in that the compressed image is represented by two lower resolution images which are bilinearly upscaled and then blended according to low precision, per-pixel weights. They also differ in that they support ARGB data in both 4-bpp and 2-bpp modes. PVRTC is the compressed texture format used in the Nokia N9 and all generations of the iPhone, iPod Touch, and iPad. It is also supported in certain Android devices, that use PowerVR GPUs. Data structure In both PVRTC and PVRTC2, texture data is stored in blocks (but note that the decoding of any 2x2 set of texels requires access to 4 of these blocks.) A data block always occupies 64 bits (8 bytes) of storage/memory space and thus, in 4-bit mode (4bpp), there will be one block for each 4×4 pixels. In 2-bit mode (2-bpp), there will be one block for every 8×4 pixels. For example, a 1024×1024 4-bpp PVRTC texture would have 65,536 blocks and take 524,288 bytes of storage/memory space. In some hardware implementations, the blocks are arranged in a variant of Morton order. With PVRTC there are six different variables stored in each block: Modulation data (32 bits), punch-through alpha flag (1 bit), color A (15 bits), color A opaque flag (1 bit), color B (14 bits) and color B opaque flag (1 bit). With PVRTC2 there are six different variables stored to one block: Modulation data (32 bits), modulation flag (1 bit), color B (14 bits), hard transition flag (1 bit), color A (15 bits) and opacity flag (1 bit). Although in PVRTC the opacity flags can be set independently for the A & B colours, in PVRTC2, Color A and Color B must both be in same format (i.e. either both RGB or both RGBA). See also Texture compression Adaptive Scalable Texture Compression (ASTC) References Simon Fenney's 3D Graphics Pages Taking texture compression to a new dimension with PVRTC2 PVRTC: the most efficient texture compression standard for the mobile graphics world Texture compression
https://en.wikipedia.org/wiki/Get%20Lost%21
Get Lost! is a British television drama serial made by Yorkshire Television in 1981 for the ITV network. Written by Alan Plater, the plot concerns the disappearance of the husband of Leeds schoolteacher Judy Threadgold (Bridget Turner). Investigating the disappearance, with the aid of her colleague, woodwork teacher Neville Keaton (Alun Armstrong), Judy learns of the existence of a secret organisation that helps disaffected people leave their unhappy lives behind. Alan Plater's The Beiderbecke Affair (1985) started out as a sequel to Get Lost! but was rewritten with new characters when Alun Armstrong proved unavailable to reprise the role of Neville Keaton. Plot The plot of Get Lost! concerns the disappearance of Jim Threadgold (Brian Southwood), husband of English teacher Judy Threadgold (Turner). Aided by her colleague, woodwork teacher Neville Keaton (Armstrong), Judy sets out to find out what has happened to her husband. Judy and Neville soon discover the existence of a secret organisation dedicated to assisting people who want to escape the mundanity of their lives and families and just disappear. Although Judy eventually finds her missing husband, she is none too enthusiastic about taking him back and allows him to seek a new life running a fish and chip shop. Her adversarial relationship with Neville blossoms into a love affair. Cast Bridget Turner as Judy Threadgold Alun Armstrong as Neville Keaton David Calder as Det Sgt Tomlin Michael Goldie as Meagan Sheila Reid as Miss Langley Neil McCarthy as Herbert Doyle Rosalie Williams as Mrs Crimmins Production Development Alan Plater had begun writing for television in the early 1960s and had been a regular writer on the police series Z-Cars (1962–78) and its spin-off series Softly, Softly (1966–69) and Softly, Softly: Taskforce (1969–76). He had also written several plays for the BBC and ITV and created and wrote the sitcom Oh No, It's Selwyn Froggitt! (1974). Plater's scripts were noted for their strong depiction of the lives of the inhabitants of Northern England. In 1978, Plater was commissioned by David Cunliffe, an executive producer at Yorkshire Television (YTV), to adapt J. B. Priestley's The Good Companions as a thirteen part serial. Plater was only able to stretch the plot to fill nine episodes and so offered to write four episodes of what he called a "non-violent thriller" to make up the balance. Writing Using characters inspired by Nick and Nora Charles, the detectives in the film The Thin Man (1934) and its sequels, Plater sought to juxtapose the conventions of the hardboiled thriller, as expounded by the likes of Raymond Chandler and Dashiell Hammett, with the mundanity of life in Yorkshire. The plot was inspired by a newspaper article that reported that 20,000 people went missing in the UK each year. In creating his two protagonists – Neville Keaton and Judy Threadgold (named after Sunderland goalkeeper Harry Threadgold) – Plater hit upon the idea of making them sch
https://en.wikipedia.org/wiki/Tape%20management%20system
A tape management system (TMS) is computer software that manages the usage and retention of computer backup tapes. This may be done as a stand-alone function or as part of a broader backup software package. The role of a tape management system A modern tape management system (TMS) is usually used in conjunction with backup applications and are generally used to manage magnetic tape media that contains backup information and other electronically stored information. Tape management systems are used by organizations to locate, track, and rotate media according to an organizations internal policies as well as government regulations. Categories of tape management systems Stand-alone tape management systems Stand-alone tape management systems are predominant on mainframe platforms where tape is used as both a backup and base load storage medium. Mainframe systems such as IBM's z/OS do provide some basic support for tape inventory control via the OS Catalog but as cataloging files is optional it is usually required that an additional software package does the following: Ensure that live tape volumes are not over-written. Keep a list of tape volumes that are eligible to be over-written (known as scratch tapes). Maintain an online catalog of the location of files written to tape and a list of what files reside on each tape volume. These operations are usually achieved by using operating system "hooks" to intercept file open and close operations. Backup applications Robotic control systems Off-line tape management systems Commercially available tape management systems Mainframe Stand-alone tape management systems BrightStore CA-1 (previously known as UCC-1 when Computer Associates acquired Uccel in '87) CA Dynam/TLMS (previously known as TLMS II when CA acquired Capex Corporation in '82) IBM RMM BMC Control-M/Tape (previously known as Control-T when BMC Software acquired New Dimension Software in '99) ASG Zara Lascon Storage's GFS/AFM Robotic control/management systems StorageTek HSC StorageTek ExLM Distributed systems AES Webscan Tape Management System TapeTrack Tape Management Framework Vertices Tape Management System VaultLedger Tape Management System See also List of backup software Backup software Storage software
https://en.wikipedia.org/wiki/Artificial%20Intelligence%20System
Artificial Intelligence System (AIS) was a volunteer computing project undertaken by Intelligence Realm, Inc. with the long-term goal of simulating the human brain in real time, complete with artificial consciousness and artificial general intelligence. They claimed to have found, in research, the "mechanisms of knowledge representation in the brain which is equivalent to finding artificial intelligence", before moving into the developmental phase. History The project's initial goal was recreating the largest brain simulation to date, performed by neuroscientist Eugene M. Izhikevich of The Neurosciences Institute in San Diego, California. Izhikevich simulated 1 second of activity of 100 billion neurons (the estimated number of neurons in the human brain) in 50 days using a cluster of 27 3-gigahertz processors. He extrapolated that a real-time simulation of the brain could not be achieved before 2016. The project aimed to disprove this prediction. Artificial Intelligence System announced on On Sep 5, 2007 that they will use the Berkeley Open Infrastructure for Network Computing (BOINC) software to perform intensive calculations. On July 12, 2008, the first phase of the project had been completed by reaching the 100 billion neuron mark. The project then continued to simulate neurons while they completed the development of other related applications. Application description the application is a brain network test system that reenacts biophysical sensory cells characterized as numerical models and use the Hodgkin–Huxley model to portray the properties of brain cells the rundown of models will keep developing and will ultimately arrive at many models the test system gets information from XML records that contain cell properties which portray behavior the test system will process the framework's way of behaving over the long haul calculation results will be saved in records Conclusion Artificial Intelligence System had successfully simulated over 700 billion neurons by April 2009 and the project reported 7119 participants in January, 2010 AIS was last seen working on the post data stage before the website was no longer available after November 2010. See also Artificial consciousness Blue Brain Outline of artificial intelligence References Free science software Science in society Volunteer computing projects Artificial neural networks Computational neuroscience History of artificial intelligence
https://en.wikipedia.org/wiki/Classic%20British%20Motor%20Racing
Classic British Motor Racing is a racing video game developed by budget developer Data Design Interactive. It was published by Bold Games (Destineer) in North America in early 2008, and in PAL regions 2–4 months later. The game features 13 tracks and 13 classic British cars licensed by the developer, and players drive around famous areas of Britain. The game is playable with up to two people. Reviews were critically negative, which the Wii version holds a score of 35.50% from GameRankings, while the PS2 holds a score of 35%, respectively. The PlayStation 2 and Windows versions were released on 10 February 2006. Gameplay Classic British Motor Racing is a racing game where players pick from a host of classic British vehicles and drive around famous areas of Britain, which can be played in 3 difficulties, Beginner, Intermediate, and Expert. The game only runs on 480i and up to two players can race in the game. While racing, players tilt the Wii Remote to steer their car and hold the 2 button to accelerate, or the 1 button to go backwards. To unlock tracks, players must win tracks to unlock the locked tracks in the game, which players also can unlock other Cars too. A pop song is also played in every race. Development Minneapolis-based publisher/developer Bold Games partnered with England's Data Design Interactive to distribute and publish ten casual Wii titles, with Classic British Motor Racing as one of them. Paul Rinde, CEO of Bold Games parent company Destineer, said that he was thrilled to be working with Data Design Interactive as their entry into the Wii casual games market. Stewart Green, president of Data Design Interactive, was very pleased to be working with Bold Games, and was happy to have their "titles as the starting point for its entry into this exciting market sector". The first titles from the Bold Games/DDI partnership were scheduled to be in stores by the end of the year 2007. The developer licensed 13 classic British cars, and 6 tracks from the British Isles. Like all games developed by Data Design, it was created using the 'Game Orientated Development System' (or G.O.D.S.) engine. The engine was developed to produce the game for multiple systems. Reception Like many Data Design Interactive games, the Wii version received negative reviews from critics. The Wii version currently holds a score of 35.50%. IGN gave the Wii version a 2.1 out of ten and criticised the gameplay problems, awful graphics, and for only having one song that loops. Cheat Code Central's Amanda L. Kondolojy gave the game a 2.5/5, and stated it was "best to Leave the British Classics in the Past". The PlayStation 2 version also received negative reviews. It currently holds a score of 35% on GameRankings, in respective to the Wii version. References 2008 video games Data Design Interactive games PlayStation 2 games Racing video games Video games developed in the United Kingdom Video games set in the United Kingdom Wii games Windows games Multiplayer and si
https://en.wikipedia.org/wiki/Ready%20to%20Fly%20%28Amy%20Pearson%20song%29
"Ready to Fly" is the third single and the second most successful single to be lifted from Amy Pearson's debut album, Who I Am. The song "Ready To Fly" was used by the Seven Network as the song to the 2008 Beijing Olympics. It was released on 5 April 2008. It started on airplay on Australian radio and is played with a different radio mix, with more guitars and drum beats. The song features the Indonesian singer Rio Febrian. Music video The music video for "Ready to Fly" was shot in Shanghai, China. The video starts off with Pearson sitting down at a table in a room (or restaurant) writing the lyrics to the song on a notepad. Outside of the room there is a couple arguing with Chinese authorities. The music video then moves to Sydney. The man asks for her phone number, wanting to take her out on a date. Pearson then goes outside and starts walking as well. The boyfriend puts the engagement ring on Pearson's finger, she "accepts" & they get married (via Qantas) the next week in a Catholic church in Sydney. Many different shots of Pearson in different places were used, such as the above-mentioned room, the streets of Shanghai, a place with a bright red background etc. As it was shot in Shanghai, there were various usage of Chinese culture. When the video started, it showed a group of people practicing Tai Chi, however, focusing more on one man than the group. Outside the room in which Pearson started off the video in, and down the alley she walks down, there were many red lanterns and decorations hung around buildings. Many buildings are also seen as modern Chinese architecture. Track listing "Ready to Fly" (Radio Edit) - 4:21 "Ready to Fly" (Album Version) - 4:32 "We Both Know" (Duet with Guy Sebastian) "Ready to Fly" (Drive Remix) iTunes Exclusive "Ready to Fly" (Sonic Funk Remix) "Ready to Fly" (Electrodex Remix) iTunes Remix EP Ready to Fly (Drive Remix) Ready to Fly (Andy J Remix) Ready to Fly (Diamond Cut Remix) Ready to Fly (Touched By Remix) Ready to Fly (Radio Remix) Alternate commercial uses The song was used extensively in Pinoy Idol during the audition and theatre rounds of the competition. Charts Although "Ready to Fly" only peaked at #40, it spent 21 weeks inside the top 100 singles chart in Australia. End of Year Charts References 2008 singles Amy Pearson songs Songs written by Tom Nichols (songwriter) Songs written by Amy Pearson 2008 songs Sony BMG singles
https://en.wikipedia.org/wiki/Renren
The Renren Network (), formerly known as the Xiaonei Network (), is a Chinese social networking service similar to Facebook. It was popular among college students. Renren Inc. has its headquarters in Chaoyang District, Beijing, with additional offices in Shanghai and Guangzhou. Renren had an $740m initial public offering (IPO) on the New York Stock Exchange in April 2011. History Renren, which started as Xiaonei.com, was founded by a group of students, including Wang Xing, Wang Huiwen and Lai Binqiang at Tsinghua University and Tianjin University in December 2005. Joseph Chen, who had himself tried to launch a student community website called ChinaRen as early as 1999 and sold it in 2000, acquired Xiaonei through his new company Oak Pacific in October 2006. Born in 1970 in China, Chen moved with his family to the US where he studied at the Massachusetts Institute of Technology and later earned an MBA from Stanford University. He remains the chairman and CEO. In March 2008, Xiaonei launched its WAP version, which users can access through mobile phones. Xiaonei features an instant messaging service (Rénrénzhuōmiàn, Chinese: 人人桌面) designed typically for its users using XMPP, which is more popular than Facebook chat. In August 2009, Xiaonei officially changed its name to Renren, as well as its domain to www.renren.com. And also, the logo has changed from the Chinese word "xiaonei" to the Chinese word "renren"("ren", meaning "people" or "person", and "everyone" when used twice in a row). This name change from 'inside the school' (Xiaonei 校内) to 'everybody' (renren 人人) reflected the expansion aspirations held by Oak Pacific – to be more than a network dedicated to students, but instead be the biggest Chinese social network website. In April 2011, the company filed with the SEC to raise $584 million in a US IPO, offering Renren stock on the New York Stock Exchange. The company reported 2010 revenue of US$76 million. Initially, users were only able to use the site from specific IP addresses belonging to colleges. This was done to encourage users to use their real identities on the service. Corporate affairs Renren Inc. has its headquarters on the 23rd floor of the Jing An Center (S: 静安中心, T: 靜安中心, P: Jìng'ān Zhōngxīn) in Chaoyang District, Beijing. Renren has its Shanghai office in the SOHO Zhong Shan Square (S: SOHO中山广场, T: SOHO中山廣場, P: SOHO Zhōngshān Guǎngchǎng) in Changning District, Shanghai. Renren has its Guangzhou office in the China Shine Plaza (S: 耀中广场, T: 耀中廣場, P: Yàozhōng Guǎngchǎng) in Tianhe District, Guangzhou. In February 2011, Renren made a pre-IPO announcement that it had 160 million registered users. Later, in April 2011, it had to update its statement accurately to "a total of 31 million active monthly users." Open platform In July 2007, Xiaonei officially facilitated its open platform, allowing third parties to integrate with platform by rendering modifications and adding functionalities. The APIs Xiaonei listed are quite
https://en.wikipedia.org/wiki/Virginia%20jihad%20network
The Virginia jihad network was a group network of Islamist jihadist young men centered in Northern Virginia that were accused of conspiring to train and participate in violence overseas against US forces in Afghanistan and Indian forces in Kashmir. The men, Muhammed Aatique, Hammad Abdur-Raheem, Ibrahim Ahmed Al-Hamdi, Seifullah Chapman, Khwaja Hasan, Masoud Khan, Yong Kwon, Randall Todd Royer and Donald Surratt, were found guilty of various terrorism-related offences. Convictions Ali al-Timimi was found guilty of exhorting his followers to join the Taliban and fight US troops. Ali Asad Chandia was a teacher at a school in Maryland and was accused of providing material support to Lashkar-e-Taiba, a U.S.-designated Pakistani terrorist organization. Chandia was sentenced to 15 years in prison, with three years of supervised release at the end of his incarceration Randall Todd Royer pleaded guilty to two counts of aiding and abetting the use and discharge of a firearm and carrying of an explosion in relation to a crime and during the commission of a felony. These counts stemmed from assisting other young men to gain entry to the Lashkar-e-Taiba training camp. Three other individuals attending that meeting, Yong Kwon, Muhammed Aatique, and Khwaja Hasan—all of whom pleaded guilty—stated that they went to the Lashkar-e-Taiba camp to obtain combat training for the purpose engaging in violent jihad in Afghanistan against the American troops that they expected would soon invade that country. Al-Hamdi also admitted to carrying a rocket-propelled grenade in furtherance of a conspiracy to undertake a military operation against India. Seifullah Chapman maintained his intention to travel to the training camp was for a grueling physical challenge, not to seek out fighting in a holy war. Masoud Khan, Seifullah Chapman and Hammad Abdur-Raheem all were convicted of conspiring to provide material support to Lashkar-e-Taiba, a designated Foreign Terrorist Organization, and to attack India in violation of the Neutrality Act of 1794, as well as of various firearms related offenses, for conduct that spanned from 2000 to 2003. U.S. District Judge Leonie Brinkema considered the sentences "draconian" and suggested preferring to imposing a lesser sentence for some of the convicted men. Aftermath A 2011 NPR report claimed some of the people associated with this group were imprisoned in a highly restrictive Communication Management Unit. A federal judge in Virginia ordered Seifullah Chapman, one of the convicted men from the case serving a 65-year sentence, to be released from prison in July 2018. The decision stemmed from a recent Supreme Court case that overturned a law that was found to be unconstitutionally vague in the way it described a crime. Chapman argued his initial conviction of violating a law was vague in the way it described "a crime of violence". A month later, the same judge vacated the convictions of Masoud Khan, a second man from the case serv
https://en.wikipedia.org/wiki/The%20Higher%20Institute%20of%20Computer%20Technology
College of Computer Technology Tripoli (Arabic: كلية تقنية الحاسوب طرابلس) sometimes abbreviated as CCTT is a government sponsored leading institute of higher education in Tripoli, Libya. Founded in 1990, College of Computer Technology Tripoli began with an emphasis on the computer science, programming, networking and automated control . CCTT is known by its discipline and strict admission requirements. To be accepted in the institute, one need to take qualifying courses and set for entrance exams. The institute alumni have good reputation in the local technology market and research institutions and some of them holds sensitive positions in the government. Programs of Study The institute offers four years B.SC degree in the following fields: Department of (Hardware and Maintenance): Computer Networks. Automated Control Engineering. Computer Engineering and Maintenance. Department of (Computer Science and IT): Software Development. Department of Training Courses. IT and Maintenance Courses. Control Courses. Systems administration Courses. Networking Courses. Around 1000 students studying at the Institute every year and the number is increasing every year. Academics The institute offers a bachelor's degree in computer and software engineering, programming, networks and automated control. Which will be taken in four years of full-time study and final graduation project. Scholarships The Institute is sponsored by the government so all tuition fees are paid by the government and there are very few positions for student every year especially foreign students. Research and Industry Corporations Even though the research infrastructure in Libya is not very good-due to several causes like the embargo and lack of qualified researchers- the institute students have done outstanding graduation projects in robotics, control systems and networking, those project have got local and international awards. References Official website Ministry of Higher Education Page UNESCO accreditation page. Education in Libya Center for Quality Assurance and Accreditation in Higher Education Institutions Universities and colleges established in 1990 Universities and colleges in Libya Organizations based in Tripoli, Libya 1990 establishments in Libya
https://en.wikipedia.org/wiki/GMA%20Life%20TV
GMA Life TV is a 24-hour Philippine pay television channel launched in February 2008 by GMA Network. Programming Programming consists mostly of shows from GMA Network and GTV as well as previously aired shows, documentaries, cooking shows, travelogues, films and sports events from the Philippines. Most weekend shows are up to date, with the exception of some shows that air on a one-episode delay basis. History The channel carries programming from GMA Network and GTV. It was launched on February 16, 2008, in Japan and is available in the Middle East and North Africa through OSN and My-HD. In June 2008 it was launched in Australia and New Zealand on UBI World TV. It is now also available in the whole United States via Dish Network and DirecTV. On November 2, 2009, it was launched in Hawaii via Oceanic Time Warner Cable as a video on demand channel. The channel was launched in Singapore on SingTel in June 2013. On April 26, 2023, ABS-CBN and GMA Network announced that GMA Life TV will be available on ABS-CBN's iWantTFC for viewers outside of the Philippines on May 1 alongside GMA Pinoy TV and GMA News TV. See also GMA Network GMA Pinoy TV GMA News TV International GTV Overseas Filipino References External links DISH Network Filipino Package Official Site International broadcasters Television networks in the United States Direct broadcast satellite services GMA International Filipino diaspora Cable television in the United States International broadcasting Television channels and stations established in 2008 Filipino-language television stations 2008 establishments in the Philippines GMA Network (company) channels
https://en.wikipedia.org/wiki/Gene%20Ball
Gene Ball is a computer science researcher and computer programmer. Ball obtained a bachelor's degree from the University of Oklahoma, and attended graduate school at the University of Rochester, completing a master's degree and finishing his doctorate in 1982. While at Rochester, he met Rick Rashid, and together they created Alto Trek, one of the earlier networked multiplayer computer games. In 1979, along with Rashid, Ball worked as a researcher Carnegie Mellon University. In 1983, he left academia for two years, spending 1983 and 1984 designing software at Formative Technologies. In 1985, he became an assistant professor at the University of Delaware at Newark. From 1991 until 2001 he was a researcher at Microsoft, leading the Persona Project, which focused on developing lifelike computer characters that could conversationally interact with users. References Contributor biography in Emotions in Humans and Artifacts, by Robert Trappl, Paolo Petta, and Sabine Payr. . University of Delaware faculty Microsoft employees University of Rochester alumni University of Oklahoma alumni Carnegie Mellon University faculty Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Cyberchump
Cyberchump (sometimes stylized as CyberCHUMP) is an electronica duo whose music is mainly ambient and often experimental and electro-organic, formed by Milwaukee multimedia artist, and Xposed 4Heads founder, leader, and lead vocalist, Mark G.E., the multimedia name of Mark Eberhage, and Kansas City musician Jim Skeel, who was formerly in the bands The Buckthrusters and Short-term Memory, and featured on the compilation Fresh Sounds from Middle America (vol 2). The band members live in different cities and made a point of collaborating long distance via Internet, long before the COVID-19 pandemic. The band's name derives from the duo's formative "fumbling learning process" with the tools and technical means of their collaboration. Music critic and founder of the Art of Noise, Paul Morley lists Cyberchump's Dreams Groove as "One of 88 albums" that should be heard in his book Words and Music: A History of Pop in the Shape of a City. In The Shepherd Express, reviewer Jason Kiel describes the duo's collaborative dynamic by noting that "Skeel's tendencies to jam are an intriguing counterpoint to Mark G.E.'s methodical experimentation." In an OnMilwaukee article, reviewer Bobby Tanzillo called the music of the electronic, ambient, experimental rock duo "genre-defying and ever-evolving." Guest musicians have included John Kruth, Mike Kashou, who played bass on the first album Garbage, by the band Garbage, Jason Loveall from The Danglers, Jason Todd, and a telephone call cameo from Victor DeLorenzo of the Violent Femmes. Several of their album covers are the work of international surrealist artist J. Karl Bogartte of the Chicago Surrealist Group, whose work is in several museums, including the collection of the Milwaukee Art Museum. Their music appears in the documentary Maybe A Baby by filmmaker Theresa Ala Mode, and Ross Bigley's film Zombie Frat House. Mark G.E.'s short film homage to Edward Gorey, The Unfortunate Gift, was submitted to the Edward Gorey House Archive by Florence Parry Heide, and accepted. Many of his other videos have been screened at several Milwaukee Film Festivals, and others. Cyberchump have published many full length releases, and songs on compilations released by Om Records, Spiralight, and Chi-Qi. Radio exposure The duo is played on several national radio programs including Echoes, Music from the Hearts of Space, Musical Starstreams, and internationally on the programs Ultima Thule Ambient Music, and Pandora. The duo are interviewed on the radio regularly with numerous specials lasting two or three hours, by Mary Bartlein on Milwaukee station WMSE, and Jim Lange's Eclectopia which airs on West Virginia Public Broadcasting radio. Members Mark G.E. – altered keyboards, five-string fretless bass, electric guitar, treated accordion, samples, machines (2000–present) Jim Skeel – high & low looped electric guitars, keyboards, bass, samples, manipulations (2000–present) Guest members Victor DeLorenzo – answering machine voice
https://en.wikipedia.org/wiki/App%20Store%20%28Apple%29
The App Store is an app marketplace developed and maintained by Apple Inc., for mobile apps on its iOS and iPadOS operating systems. The store allows users to browse and download approved apps developed within Apple's iOS SDK. Apps can be downloaded on the iPhone, iPod Touch, or iPad, and some can be transferred to the Apple Watch smartwatch or 4th-generation or newer Apple TVs as extensions of iPhone apps. The App Store was opened on July 10, 2008, with an initial 500 applications available. The number of apps peaked at around 2.2 million in 2017, but declined slightly over the next few years as Apple began a process to remove old or 32-bit apps. , the store features more than 1.8 million apps. While Apple touts the role of the App Store in creating new jobs in the "app economy" and claims to have paid over $155 billion to developers, the App Store has also attracted criticism from developers and government regulators that it operates a monopoly and that Apple's 30% cut of revenues from the store is excessive. In October 2021, the Netherlands Authority for Consumers and Markets (ACM) concluded that in-app commissions from Apple's App Store are anti-competitive and would demand that Apple change its in-app payment system policies. History While originally developing iPhone prior to its unveiling in 2007, Apple's then-CEO Steve Jobs did not intend to let third-party developers build native apps for iOS, instead directing them to make web applications for the Safari web browser. However, backlash from developers prompted the company to reconsider, with Jobs announcing in October 2007 that Apple would have a software development kit available for developers by February 2008. The SDK was released on March 6, 2008. The iPhone App Store opened on July 10, 2008. On July 11, the iPhone 3G was released and came pre-loaded with support for App Store. Initially apps could be free or paid, but then in 2009, Apple added the ability to add in-app purchases which quickly became the dominant way to monetize apps, especially games. After the success of Apple's App Store and the launch of similar services by its competitors, the term "app store" has been adopted to refer to any similar service for mobile devices. However, Apple applied for a U.S. trademark on the term "App Store" in 2008, which was tentatively approved in early 2011. In June 2011, U.S. District Judge Phyllis Hamilton, who was presiding over Apple's case against Amazon, said she would "probably" deny Apple's motion to stop Amazon from using the "App Store" name. In July, Apple was denied preliminary injunction against Amazon's Appstore by a federal judge. The term app has become a popular buzzword; in January 2011, app was awarded the honor of being 2010's "Word of the Year" by the American Dialect Society. "App" has been used as shorthand for "application" since at least the late 1970s, and in product names since at least 2006, for example then-named Google Apps. Apple announced Mac App St
https://en.wikipedia.org/wiki/Crumlin%20Arm%20%28Monmouthshire%20canal%29
The Crumlin Arm of the Monmouthshire canal is part of the Monmouthshire & Brecon Canal network in South Wales. It connected Crumlin and its tramways to the Docks at Newport. History The Crumlin to Abercarn section opened in March 1794 and two years later the branch was open except for Fourteen Locks. It was not until April 1799 that the proprietors (shareholders) declared that the canal was finally complete. The branch was long, rising 358 ft (109 m) through 32 locks. Route The canal started at a basin in Crumlin and ran through the villages of Newbridge, Abercarn and Cwmcarn now under the A467. The canal then reached Cwmcarn lock now under the grass at the end of the present canal. The canal crosses the Pontywaun aqueduct and follow the side of the mountain above Crosskeys and Risca this section is the longest lock-free pound on the system until the Fourteen Locks. The canal descends the fourteen locks and turns sharp along the hill side. The canal now flows next to the M4 into urban Newport to Barrack Hill tunnel (now disused and culverted). The rest of the canal through the city is lost beneath modern roads and buildings. The Kingsway dual carriageway follows the route of the canal to the now-filled-in Old Town Docks near the Transporter Bridge. Locks These were originally numbered (as were bridges) by the usual system of top down. Therefore, Cwmcarn lock was number 12. The GWR renumbered the locks (and bridges) from Newport to Crumlin and then up the Main Line to Brecon. Thus, Cwmcarn lock became Lock 22. Lock 22 was under the grass area just beyond the end of the canal. Going down was a lock-free pound to the top of Fourteen Locks and going up was another pound to Abercarn bottom lock below the old Prince of Wales Colliery. Traffic The vast majority of the tonnage was coal or iron (particularly coal). Bricks from Allt-yr-yn Brickworks were later important but in relatively small tonnages. There was a regular general cargo boat twice a week from Newport to Crumlin until 1915 but whilst it was important for traders, the tonnages were small. The Branch was often short of water and by 1829 a tramroad was available from Beaufort to Newport as well as from the big collieries at Abercarn. This meant that the canal above Abercarn became less used. Boats were approximately 64 ft 9 in (19 m) long by 9 ft 2 in (2.8 m) wide. Canal today Today the canal is mostly disused and the northern end is lost beneath the A467 bypass. Eight miles of canal is viable but blocked by roads. The National cycle route 47 follows the towpath for seven miles (11 km) from Barrack Hill tunnel, Newport to Green Meadow Bridge, Crosskeys. of canal between Pontywaun Aqueduct (Pontywaun) to Darren Bridge (Risca) is still navigable but only by small craft via a slipway at Pontywaun. Plans There are plans to reopen the canal down to the Fourteen Locks then on to central Newport. This requires building two aqueducts, raising a number of roads and rebuilding 2
https://en.wikipedia.org/wiki/Semitan
Semitan is the company responsible for the comprehensive public transport network of Nantes Métropole, the urban community of the French city of Nantes. The network operated by Semitan is marketed under the name and logo TAN and this abbreviated form is also sometimes used to refer to the company. Semitan is itself an acronym for the Société d'Economie Mixte des Transports de l'Agglomération Nantaise. The TAN network comprises three Tramway lines, two Busway lines, an extensive network of buses, an airport shuttle bus line, two Navibus lines and a night bus network. A single common fare system covers all these modes and also extends to suburban trains within the Métropole boundaries, although these trains are not operated by Semitan. Semitan is a mixed private and public sector company. As of 2007, its principal shareholders are Nantes Métropole (65%), the transport group Transdev (14.99%), banking group Caisse d'Epargne (10%) and the Chambre de commerce et d'industrie de Nantes (10%). It has been responsible through renewable 6 years "public service delegations", for the public transports of Nantes since it was formed in 1979, although the precise area covered has varied over the years. Organization Currently, the TAN network comprises three Tramway lines, one Busway line, two Navibus lines, an extensive bus network that includes 56 lines and a night bus network. Additionally, Semitan has an exclusive agreement with French national train operator SNCF to allow TAN passengers to ride suburban trains within the urban area limits with a valid TAN ticket or pass. TAN also operates "Navette Aéroport" (airport shuttle bus) between downtown Nantes and Nantes Atlantique Airport. Fares The TAN network in Nantes uses paper tickets and passes along with contact less smart cards. There are no travel zones on the network in Greater Nantes. Tickets and passes allow free transfer and are universally valid on the Tramway, Busway, Nantes buses, Navibus, and suburban trains within Nantes Métropole. Ticket machines (which accept cash and credit cards) are present at every Tramway and Busway stations. There are also some staffed ticket offices open for limited periods only. Also, most newsagents sell some tickets and passes. Like many public transport systems in Europe, TAN operates on a proof-of-payment system. The network is patrolled by fare inspectors equipped with handheld card readers. Passengers traveling without a valid ticket are straightaway asked about their identity and fined €46.50 (amounts may vary depending the nature of the infraction). Single trip and day tickets Semitan issues singles trip tickets (Ticket 1 h) valid for one hour, which costs €1.50 a 10x saver ticket booklet (Carnet de 10 tickets 1h)(costing €13.80) valid one hour each, a discounted 10x saver ticket booklet (Carnet de 10 tickets 1h - Tarif réduit) valid one hour each, an airport transit ticket (Ticket navette aéroport), a 24 hours ticket (Ticket 24h)(€4.4) valid an entire da
https://en.wikipedia.org/wiki/Hayashi%20Tadataka
was a Japanese daimyō of the late Edo period, who ruled the Jōzai Domain. Later in life, he was also known by his style, . During the Boshin War of 1868, Hayashi led his domain's forces in support of the armies of the former shōgun, and then the Ōuetsu Reppan Dōmei. Unlike the Tokugawa forces that went on to Ezo, Hayashi surrendered willingly when he received word that the Tokugawa family was to be granted a fief in Shizuoka. During the Meiji period he worked in various occupations (even as a clerk for a business in Hakodate), before working for the government. In the Meiji period, his family was ennobled as part of the kazoku system. For a time he also served at Tōshō-gū in Nikkō. Hayashi lived well into the 20th century, and was famous as "the last daimyō". He died in early 1941, in an apartment run by his daughter Mitsu. When asked for a jisei on the day he died, he is reported to have said, "I had one in 1868. Not now." (明治元年にやつた。今は無い) Hayashi appears as a character in Ikenami Shōtarō's novel Bakumatsu Yūgekitai. References Yamakawa Kenjirō (1933). Aizu Boshin senshi. Tokyo: Tokyo Daigaku Shuppankai. Nakamura Akihiko (2000). Dappan daimyo no Boshinsensō: Kazusa Jōzai hanshu Hayashi Tadataka no shōgai. Tokyo: Chūōkōron-shinsha. |- People of the Boshin War 1848 births 1941 deaths Japanese Shintoists Nobility from Tokyo Kazoku Fudai daimyo
https://en.wikipedia.org/wiki/Sumi%20Helal
Dr. Abdelsalam (Sumi) Helal is a computer scientist who was born in Suez, Egypt. He graduated from Alexandria University in 1982. He is best known for his work in Pervasive Computing, Mobile computing and the Internet of Things, and their human-centric applications in the domains of aging, personal health and disability. He is a professor at the Computer and Information Science and Engineering Department (CISE) at the University of Florida and the director of its Mobile and Pervasive Computing Laboratory Dr. Helal currently serves as the editor-in-chief of IEEE Computer. He was an Associate Editor in Chief and an editorial board member of the IEEE Pervasive Computing magazine. He has published extensively (Google Scholar), and founded four successful startups. His detailed profile can be found here Projects Professor Helal has worked as a principal investigator on several projects funded by public and private research institutes including the National Science Foundation, the Department of Education, the National Institute of Health, IBM, Microsoft, Motorola, Intel, Sun Microsystems, and ETRI among others. These funded projects are mainly focused on peer to peer mobile computing models, mobile database design, access and transactions, mobile networks and commerce, power-awareness in computing, among others. Patents Professor Helal has filled several patents some of which are published (available from here) and others are issued (available from here) Selected bibliography References 3. "Software Foundation for Critical Pervasive Computing" - Information Technologies and Electronics International Congress Digit 2007 (Conference in Puebla, Mexico). Ubiquitous computing researchers Living people University of Florida faculty Alexandria University alumni Year of birth missing (living people)
https://en.wikipedia.org/wiki/Chalcides%20pulchellus
Mocquard's cylindrical skink (Chalcides pulchellus) is a species of skink that lives in southwestern Burkina Faso. Its Latin name means "pretty". References External links Reptile database Skinks of Africa Reptiles of West Africa Reptiles described in 1906 Taxa named by François Mocquard
https://en.wikipedia.org/wiki/POSA
POSA may refer to: Pattern-Oriented Software Architecture, a series of books related to architectural patterns in the field of computer science Point-of-Sale Activation (or Point-of-Service Activation), gift cards that have no value until purchased and activated at check-out Public Order and Security Act (Zimbabwe), a piece of legislation in Zimbabwe
https://en.wikipedia.org/wiki/Ixia%20%28disambiguation%29
Ixia may refer to: Ixia, a genus of cormous plants native to South Africa Ialysos, a resort town on the island of Rhodes Ixia (company), an IP networking and communications company See also Ixias, a genus of butterfly
https://en.wikipedia.org/wiki/Biblical%20software
Biblical software or Bible software is a group of computer applications designed to read, study and in some cases discuss biblical texts and concepts. Biblical software programs are similar to e-book readers in that they include digitally formatted books, may be used to display a wide variety of inspirational books and Bibles, and can be used on portable computers. However, biblical software is geared more toward word and phrase searches, accessing study bible notes and commentaries, referencing various modern translations, cross-referencing similar passages and topics, biblical dictionaries, original language texts and language tools, maps, charts, and other e-books deemed relevant to understanding texts from a philological approach. Bible software varies in complexity and depth, depending on the needs of users, just as the purposes of the users vary from devotional reading and personal study to lesson and sermon preparation, inspirational publishing and even further research tools and translations. Basic Bible software is typically aimed at mobile phones, and is designed to simply display the text of a single Bible translation, with word and phrase searches as the only available tool. More advanced packages run on personal computers and boast far more features, display a wider variety of theological resources (see above), and may offer features such as synopses and harmonies of the Gospel narratives, morphological and syntactical searches of original texts, sentence diagramming, user notes, manual and dynamic highlighting, lectionary viewers, etc. History Interest in using computers to quickly search the Bible and copy sections of the text quickly into lessons and sermons emerged in the early 1980s. Verse Search is said to have been "the very first Bible study program available for home computer users", around 1980 or 1981, released on the Apple II. Bible-Reader was made available around 1985, using the King James Bible text and was supplied as free shareware. Programmed by Philip Kellingley in the UK, it was delivered on 5 x 5.25 inch floppy disks which expanded onto the hard drive of an IBM PC. As space was at a premium the program and data only occupied about 1 MB. It was a success, with most shareware distributors rating it as a "best-seller". In 1988, John W. Ellis, M.D. ("Doc Ellis") of Oklahoma City introduced The Bible Library 1.0, the first electronic compilation of multiple Bibles and reference texts. The original CD-ROM contained 9 Bibles and 21 References and was fast and powerful at a time when there were only a couple of slow single Bibles requiring multiple 5¼ floppy disks. In 1989, Dallas Theological Seminary produced CDWord: The Interactive Bible Library for Windows 2.x. This application featured a library of English Bibles and scholarly works, including a Greek lexicon, a Bible dictionary, and a commentary. The $595 package required a CD-ROM drive, which most users had to purchase and install separately. In 1991, facing
https://en.wikipedia.org/wiki/ACQ
Acq or ACQ may refer to: Acheng District, a district of Harbin, China; see List of administrative divisions of Heilongjiang Acq, Pas-de-Calais, a commune in France ACQ-Kingdom Broadcasting Network, the broadcasting arm of a Philippine television evangelist, Pastor Apollo C. Quiboloy Action civique de Québec, a political party in Quebec City, Quebec, Canada that contests municipal elections Alkaline Copper Quaternary, a wood preservative Nuevo Continente, a defunct airline of Peru Ta'izzi-Adeni Arabic, a variety of Yemeni Arabic Waseca Municipal Airport, a public airport serving Waseca, Minnesota, US See also ACQuiring Knowledge in Speech, Language and Hearing, a journal published by Speech Pathology Australia ACQ Solomonic Builders Development Corporation, a company building the KJC King Dome in Davos City, the Philippines Special:PrefixIndex/ACQ Special:PrefixIndex/Acq
https://en.wikipedia.org/wiki/DEC%204000%20AXP
The DEC 4000 AXP is a series of departmental server computers developed and manufactured by Digital Equipment Corporation introduced on 10 November 1992. These systems formed part of the first generation of systems based on the 64-bit Alpha AXP architecture and at the time of introduction, ran Digital's OpenVMS AXP or OSF/1 AXP operating systems. The DEC 4000 AXP was succeeded by the end of 1994 by the AlphaServer 2000 and 2100 departmental servers. Models There are two models of the DEC 4000 AXP: Model 6x0, code named Cobra: 160 MHz DECchip 21064 (EV4) processor(s) with 1 MB L2 cache each. Model 7x0, code named Fang: 190 MHz DECchip 21064 (EV4) processor(s) with 4 MB L2 cache each. It was introduced in October 1993. The possible values of 'x' is 1 or 2. These numbers specify the number of microprocessors in the system. Description The DEC 4000 AXP are two-way symmetric multiprocessing (SMP) capable systems that are housed in either a BA640 half-height cabinet or a BA641 19-inch rackmountable enclosure that contains two backplanes, a system backplane and a storage backplane. Plugged in the system backplane were one or two CPU modules, one to four memory modules, an I/O module, up to six Futurebus+ Profile B modules, and in the storage backplane, were one to four fixed media mass storage compartments and one removable media mass storage compartment. CPU module Two models of CPU module were used in the DEC 4000 AXP, the KN430 (also known as the B2001-BA), used in the Model 600 Series, and the B2012-AA, used in the Model 700 Series. The KN430 contains a 160 MHz DECchip 21064 microprocessor with 1 MB of B-cache (L2 cache), whereas the B2012-AA contains a 190 MHz DECchip 21064 with 4 MB of B-cache. Two C3 (Command, Control and Communication) ASICs on the CPU module provide a number of functions, such as implementing the B-cache controller and the bus interface unit (BIU), which interfaces the microprocessor to the 128-bit address and data multiplexed system bus to enable communication between the CPU, memory and I/O modules. These ASICs were fabricated in a 0.8 micrometre process. Memory module The MS430 memory module has capacities of 32, 64, 128, 256 and 512 MB of memory. The memory is organised into four banks, each 280 bits wide, of which 256 bits are used to store data and 24 bits are used to store error detection and correction (EDC) information. The memory is protected by EDC logic, which is capable of detecting and correcting 1-bit errors and common 2-, 3- and 4-bit errors. The memory is implemented using 280 surface mounted dual in-line package (DIP) 4-bit dynamic random access memory (DRAM) chips with capacities of 1, 4 and 16 Mb that reside on both sides of the module. Located on the module are two CMIC ASICs which control the memory and interface the module to the system bus. Each CMIC ASIC is responsible for managing half of the 280-bit memory bus and the 128-bit system bus. The CMIC ASICs are fabricated in a CMOS process an
https://en.wikipedia.org/wiki/Ravelry
Ravelry is a free social networking service and website that beta-launched in May 2007. It functions as an organizational tool for a variety of fiber arts, including knitting, crocheting, spinning and weaving. Members share projects, ideas, and their collection of yarn, fiber and tools via various components of the site. Development Spouses Cassidy and Jessica Forbes founded Ravelry in May 2007. Their idea was to create a web presence for all fiber artists. Ravelry has been mentioned by Tim Bray as one "of the world’s more successful deployments of Ruby on Rails technologies." As of March 2020, Ravelry had almost 9 million registered users, and approximately 1 million monthly active users. Features "Ravelry has become the Internet tool to help the typical needle-wielder navigate through the woolly wild." Information in Ravelry is organized within a series of tabs. Some customization is available within the tabs (i.e. the ability to re-sort information contained in a tab, create sub-tabs, or change the level of detail displayed). The site was in beta through early 2010, and new features and enhancements are still added frequently. Often these features and enhancements are driven by the community. These many features are broken down by Maria Hellstrom into three capability spaces: labor, social, and marketplace. Labor Space The labor space includes the capabilities which directly support making and documenting fiber arts projects. Capabilities such as the user "Projects" album and pattern "Queue" are tools for personal organization. Ravelry patterns can be added to a logged-in user's "Favorites," "Queue," or "Projects" pages, indicating that user's interest in, stated desire to make, or progress into the pattern, respectively; a user can additionally record their fiber-related tools ("Needles & Hooks") and available yarn ("Stash") with which to complete these projects. Ravelry also includes a searchable community-edited yarn and pattern database where users share information and project photos. The database was created by encouraging people to share their projects and information. Social Space For social networking, the site has forums, groups, and friend-related features that give people ways to interact with other knitters, crocheters, weavers and spinners. Photos can be added to project and stash pages, and also to forum posts, by connecting to the user's own Flickr or Photobucket or Picasa or Instagram account or by uploading a photo directly from the user's computer or iPhone. Ravelry and other handcraft-based social networks are unique among social networks in that "[i]t is not adequate to state that one is a knitter or crocheter – one must prove it through acts of labour and documentation." Social capital on Ravelry is "accumulated through extensive cataloguing of handmade items" and "is textually accessible through the way members interact with each other using articulated and manoeuvrable links (often in the concrete form of h
https://en.wikipedia.org/wiki/BlackBerry%20OS
BlackBerry OS is a discontinued proprietary mobile operating system developed by Canadian company BlackBerry Limited for its BlackBerry line of smartphone handheld devices. The operating system provides multitasking and supports specialized input devices adopted by BlackBerry for use in its handhelds, particularly the trackwheel, trackball, and most recently, the trackpad and touchscreen. The BlackBerry platform natively supports corporate email, through Java Micro Edition MIDP 1.0 and, more recently, a subset of MIDP 2.0, which allows complete wireless activation and synchronization with Microsoft Exchange, Lotus Domino, or Novell GroupWise email, calendar, tasks, notes and contacts, when used with BlackBerry Enterprise Server. The operating system also supports WAP 2.0. Updates to the operating system were automatically available from wireless carriers that supported the BlackBerry over the air software loading (OTASL) service. Third-party developers wrote software using the available BlackBerry API classes, although applications that made use of certain functionality needed to be digitally signed. Research from June 2011 indicated that approximately 45% of mobile developers were using the platform. BlackBerry OS was discontinued after the release of BlackBerry 10 in January 2013, and support for it ceased on January 4, 2022. Release history BlackBerry 9720 The BlackBerry 9720 runs a version of BlackBerry OS 7.1 with updates to the user interface that mimics BlackBerry 10, including a new lock screen, Application Switcher and Music, Pictures, Videos and Phone apps. Availability While BlackBerry Limited developed and released updated versions of its operating system for each device, individual carriers decided if and when a version was released to their users. BlackBerry OS has now reached end-of-life. Therefore, devices running it are no longer sold new. BlackBerry fonts The following is a list of fonts included in BlackBerry OS (some are not included in older versions): Andalé Mono Arial BBAlpha Sans BBAlpha Sans Condensed BBAlpha Serif BBCAPITALS BBCCasual BBClarity BBCondensed BBGlobal Sans BBGlobal Serif BBMillbank BBMillbank Tall BBSansSerif BBSansSerifSquare BBSerifFixed Comic Sans MS Courier New Georgia Impact Tahoma Times New Roman Trebuchet MS Verdana BBAlphaSans and BBAlphaSerif are based on the free software DejaVu fonts. BlackBerry Tablet OS On September 27, 2010, BlackBerry Limited announced a new unrelated QNX-based platform, BlackBerry Tablet OS, to run on its BlackBerry PlayBook tablet computer. See also BlackBerry (company) BlackBerry 10 Comparison of mobile operating systems Index of articles related to BlackBerry OS Usage share of operating systems List of BlackBerry products References External links BlackBerry BlackBerry software Discontinued operating systems Embedded operating systems Mobile operating systems ARM operating systems Smartphone operating systems C++ software Java platform softwa
https://en.wikipedia.org/wiki/Unstable%20Fables
Unstable Fables is a trilogy of computer-animated films produced by The Jim Henson Company in association with Flame Ventures, Prana Studios, and The Weinstein Company. The direct-to-DVD feature-length films were distributed by Genius Products. The films' casts include Brad Garrett, Jay Leno and Jamie Lynn Spears. The films irreverently and unfaithfully retell classic fairy tales, folktales, and fables with a modern twist. The first film, 3 Pigs and a Baby (based on "The Three Little Pigs"), was released on DVD on March 4, 2008. The second title, Tortoise vs. Hare (based on "The Tortoise and the Hare"), was released on September 9, 2008. The third and final release, The Goldilocks and the 3 Bears Show (based on "Goldilocks and the Three Bears"), was released on December 16, 2008. 3 Pigs and a Baby 3 Pigs and a Baby is the first animated film in the series based on "The Three Little Pigs". The direct-to-DVD film was released on March 4, 2008 and stars Jon Cryer, Brad Garrett, Steve Zahn and Jesse McCartney. Plot The Three Little Pigs become the target of a special-ops team of wolves. The wolves plan to finally infiltrate the impenetrable house of bricks by leaving a tiny wolf cub on the unassuming pigs' doorstep. The pigs take the baby in and raise him as their own. The newest addition to their family, Lucky, grows up into his teens not knowing his history, his role in the wolves' plan or the difficult choice he will have to make about the family that raised him. Cast Brad Garrett as Mason Pig Jon Cryer as Richard Pig Steve Zahn as Sandy Pig Jesse McCartney as Lucky Wolf Timothy McCartney (Jessie McCartney's brother) as Lucky (baby/child) Tom Kenny as Dr. Wolfowitz, Musical Comedy Wolf Nolan North as Big Bad Wolf, Eager Young Wolf, Dash Hammet, Wolf Guard Mark Adair-Rios as Wide-Eyed Pacifist Wolf Tara Strong as Teen Girl Wolf, Construction Cow, Popular Girl Steve Wilcox as Big Boss Wolf, Lone Wolf and Grunt Audrey Wasilewski as Contractor Cow, Hamlet DVD bonus features Animation Education: Behind the scenes of the animation process Re-Imagining A Classic: A conversation with director Howard Baker and writers Craig Barlett and Joseph Purdy The Voices of 3 Pigs and A Baby: Behind the scenes look at how the stars record their lines before animation is complete and how it all comes together. Tortoise vs. Hare Tortoise vs. Hare is the second animated film in the "Unstable Fables" series. The direct-to-DVD film, based on Aesop's fable "The Tortoise and the Hare," was released on DVD on September 9, 2008 The film features the voices of Danny Glover, Jay Leno, Vivica A. Fox, Keke Palmer, Cybill Shepherd and Drake Bell. The film won a Film Advisory Board award. Plot Fifteen years following his surprise victory over Murray Hare in a televised cross-country race, Walter Tortoise and his wife Dotty watch their daughter Crystal perform at her school talent show. Crystal performs a moving interpretive dance for which she only earns a
https://en.wikipedia.org/wiki/Deborah%20Estrin
Deborah Estrin (born December 6, 1959) is a Professor of Computer Science at Cornell Tech. She is co-founder of the non-profit Open mHealth and gave a TEDMED talk on small data in 2013. Estrin is known for her work on sensor networks, participatory sensing, mobile health, and small data. She is one of the most-referenced computer scientists of all time, with her work cited over 128,000 times according to Google Scholar. In 2009, Estrin was elected a member of the National Academy of Engineering for the pioneering design and application of heterogeneous wireless sensing systems for environmental monitoring. Career Estrin entered the University of California, Berkeley in 1977, majoring in electrical engineering and computer science (EECS). After graduating from Berkeley with a BS degree in 1980, she moved to the Massachusetts Institute of Technology, where she received her PhD (1985) in EECS under the supervision of Jerry Saltzer. She has also received honorary degrees recognizing her work: a degree honoris causa from EPFL in 2008, and an honorary doctorate degree from Uppsala University, Sweden in 2011. Estrin was a Professor of Computer Science at the University of Southern California between 1986 and 2001, and at the University of California, Los Angeles (UCLA) between 2001 and 2013, where she was the founding director of the NSF-funded Center for Embedded Networked Sensing (CENS). In 2012, Cornell Tech announced Estrin as the first academic hire to the high-tech campus in New York City. At Cornell Tech, Estrin is the Robert V. Tishman '37 Professor of Computer Science. She is also the founder of the Health Tech hub and director of the Small Data Lab, and a member of the Connected Experiences Lab. Estrin's research has focused on using mobile devices and sensors to collect and analyze data, with applications to health and well-being. Her non-profit startup, Open mHealth, created open data sharing standards and tools that allow developers of health applications to store, process, and visualize data. Her research also explores immersive recommendation systems and the privacy implications of user modeling and data use. Estrin has received numerous academic and popular recognitions for her research. She was named one of Popular Science's "Brilliant 10" in 2003. In 2007, she was elected a Fellow of the American Academy of Arts and Sciences, and in 2009 was inducted into the National Academy of Engineering. She is a fellow of the ACM and the IEEE for innovations in scalable network protocols and sensor network research. In 2018 she was elected as a McArthur Fellow for "Designing open-source platforms that leverage mobile devices and data to address socio-technological challenges such as personal health management". She is the daughter of the late Gerald Estrin, also a UCLA Computer Science professor, and of the late Thelma Estrin, a pioneering engineer and computer scientist also at UCLA. She is the sister of Judy Estrin, and a wife to Ache St
https://en.wikipedia.org/wiki/Through%20service
A through service is a concept of passenger transport that involves a vehicle travelling between lines, networks or operators on a regularly specified schedule, on which the passenger can remain on board without alighting. It may be in form of either the following: A service where the vehicle travels between different lines, or systems of infrastructure, for example, a through train service between the mainline and underground railways. A service where the vehicle changes its identity en-route without requiring passengers to alight, for example, a through tram service which runs as route 1 initially, then runs as route 2 for the latter half of the journey. The term through service may be extended to have a wider meaning encompassing a route which allows the passenger to travel without alighting, for example, in a route change announcement, if a route A-B and a route B-C is combined to A-B-C, it may be described as a new "through service" between A and C. This is in contrast with direct service, where a through service may be a circuitous route but allows the passenger on board for the whole circuitous journey. This is to be distinguished with operating arrangement which a vehicle changes its service route between revenue journeys at a terminus, but requires passengers to alight or retender fare. Rail transport A train on a through service may also be called a through train (also referred to as through service, run-through service/train or interline). In operational terms, a through train is a train operated on different railway lines, possibly between different operators as well. This is usually accomplished through compatible infrastructure—identical track gauge and durability issues (although variable gauge trains do exist, they tend to be expensive), rolling stock dimensions, curve speed and signaling compatibility, train station dimensions (to avoid damage to rolling stock), tunnels and bridge dimensions and maximum weight, and power requirements. The exact terminology (and definition) vary as usage; in the case of National Rail of the UK, a through train is one which may be used by a passenger to make their entire journey without changing trains. However, the fact that a train travels on different lines, or even tracks of different operators, may not be obvious if it is operated within the same network from a passenger's perspective. For example, trains in China commonly travel between lines to service different destination, but only when it involves a change of train number as a result of changing from a up-line to another down-line, or vice versa (see below), it is obvious to the passenger. Australia Melbourne: Metro Trains Melbourne's Werribee and Williamstown lines usually operate through to the Frankston line via Flinders Street. Perth: Transperth's Joondalup railway line runs through to the Mandurah railway line; Midland railway line runs though to the Fremantle railway line. Canada Toronto, Ontario: GO Transit's Lakeshore E
https://en.wikipedia.org/wiki/Tj%C3%A4ngvide%20image%20stone
The Tjängvide image stone, listed in Rundata as Gotland Runic Inscription 110 or G 110, is a Viking Age image stone from Tjängvide (),, from c. 700-900 CE, which is about three kilometers west of Ljugarn, Gotland, Sweden. Description The inscription on the Tjängvide stone is carved on a flat slab of limestone which measures 1.7 metres in height, is 1.2 metres wide and 0.3 metres thick. The stone was discovered in 1844 on the farm of Tjängvide, and is located in the Swedish Museum of National Antiquities in Stockholm. The stone is probably pagan in origin as no trace of any Christian elements has been found on the inscription. Imagery The stone is decorated with several figures in an upper and a lower field, which are separated by a braided pattern that resembles valknuts. In the upper field, there is a large eight-footed horse and a small rider who is offered a drinking horn by a woman, and there are also some other figures, such as a quadruped animal and some less discernible images. The rider on his horse is usually identified with Odin on his eight-legged horse Sleipnir, or a dead man who is arriving at Valhalla on Odin's horse. The female figure is identified as a valkyrie. The images of the rider on the horse is used as the logo of the Swedish Museum of National Antiquities. There are also alternative interpretations of the imagery. One interpretation, based upon the Volsunga saga, is that the rider is Sigurd who is riding on Grani (an offspring of Sleipnir) and that the welcoming woman is either Brynhild or Grimhild who is welcoming Sigurd to the court of the Gjukungs. This story was popular during the Viking Age and is depicted on other runestones and image stones known as the Sigurd stones. It is also possible that the eight legs symbolize the high speed of the horse and that the rider is a living man who is welcomed by his wife. The man behind the woman appears to carry a bow and he may represent the dead man who is hunting and the quadruped may be his dog. The lower field of the stone is almost completely filled with the image of a longship with tall aft and stern. The sail is almost as wide as the ship is long. It has been noted that the Tjängvide image stone has a phallic shape, and that similar combinations of death with erotic symbology occur on other Gotland rune and image stones. Inscription The runic inscription to the left of the field is the runic row, but several of the runes are lost. In the runic inscription to the right of the lower field, half of the runes may be lost. The runic inscription does not separate the words from each other and the runes are short-twig runes. The name Hiorulf in the text translates as "sword wolf." Below follows the inscription as it is presented by the Rundata project: Transliteration A B Transcription into Old Norse A B Translation in English A fuþork ... B ... raised the stone in memory of Hjôrulfr/Jórulfr, his brother ... References See also Death in Norse paganism 8th-century
https://en.wikipedia.org/wiki/Bela%20Talbot
Bela Talbot is a fictional character on The CW Television Network's drama/horror television series Supernatural, portrayed by Lauren Cohan. Appearing only in the third season, she uses knowledge of the supernatural world to her personal gain rather than to help those in need. Self-centered and a thorn in the side of the series' protagonists, Bela makes her living by stealing occult objects and selling them to wealthy clients. Critical reaction to the character was mixed, with negative responses from fans ultimately leading to her departure at the end of the season. Plot In her first appearance, "Bad Day at Black Rock", Bela Talbot hires two crooks to steal a cursed rabbit's foot from a storage container owned by the deceased John Winchester, a hunter of supernatural creatures. Anyone who touches the foot is granted good luck, but will die within a week if the foot is lost. She intends to sell it and shows no concern for the fate of the thieves. John's sons, series protagonists Sam and Dean, retrieve the foot but are cursed by it. Bela interferes when they attempt to destroy it, and shoots Sam in the shoulder. Dean, however, tricks her into touching it. She gives the foot up for destruction to save herself, but manages to steal $46,000 in winning lottery tickets from Dean that he had purchased using the foot's granted luck. She next appears in "Red Sky at Morning", an episode in which the Winchesters track down a ghost ship responsible for local deaths. Bela fools them into helping her again, with the three of them working together to steal the precious and magical Hand of Glory. The Winchesters plan to destroy the artifact to end the curse, but Bela steals it from them to sell to a client. However, Bela then witnesses the ghost ship, which only appears to those who have spilled the blood of a family member. Condemned to death, she turns to the Winchesters for help. Dean is prepared to leave her behind to die, but Sam comes up with a plan to save Bela's life. This time, Bela gives them $10,000 as a "thank you" before she leaves because she does not like being indebted to others. In "Fresh Blood", hunter and recently escaped felon Gordon Walker tracks Bela down and threatens to kill her unless she reveals the location of the Winchesters, as he plans to kill Sam. Bela agrees to find out their location in exchange for his priceless mojo bag, and has an unsuspecting Dean disclose their whereabouts to her. After Dean threatens to kill her, she uses a Ouija board to placate him by obtaining information on Gordon's location so the Winchesters can neutralize the other hunter first. In "Dream a Little Dream of Me", Bela returns when the Winchesters contact her for help in saving fellow hunter and family friend Bobby Singer after he falls into a mystical coma. They need dream root to enter Bobby's dreams and find out what is keeping him asleep. She claims nothing from them in compensation, explaining she is helping them in order to repay a debt to Bobb
https://en.wikipedia.org/wiki/Cristfried%20Ganander
Cristfried Ganander (21 November 1741 in Haapajärvi – 17 February 1790 in Rantsila) was a Finnish compiler of folk culture, a priest and an 18th-century lexicographer. Ganander's greatest achievement was the compilation of the first fully extensive Finnish-language dictionary which was, however, unpublished. He was also a collector of folk culture well before Elias Lönnrot. His most well-known published work is Mythologia Fennica in 1789, a reference book of folk religion. He also published some poetry and worked as a teacher. Life Ganander was born in Haapajärvi in 1741, to chaplain Thomas Ganader and his wife Helena Hiden. After his father's death in 1752, he was taken in by his grandfather Henrik Hiden, who was also a chaplain in the vicarage of Kauhajoki. Ganander himself later worked as a chaplain in Rantsila from 1775 to 1790. Ganander became a priest at the Academy of Turku and was consecrated to a post in 1763. He completed his master's degree in 1766. While studying, he became influenced by the natural sciences and became interested in the notion of Finnishness of Henrik Gabriel Porthan. Works Ganander began his literary career by publishing a collection of riddles and fairy tales, which he collected from oral tradition in Ostrobothnia while chaplain in Rantsila. His collection , was published in 1783 and comprises in its first edition, 378 riddles (though a later edition was shortened to remove some sexual and ecclesiastical riddles). It is based on the folk poetry he had collected as well as the Finnish lexicon. In 1789, was published as a reference book of folk poetry, spells, traditions, and literary sources. The book was also a presentation of the early history of the Finnish people. The work was originally completed in 1785, and was in fact a subset of Ganander's wider lexicographical work. A reprinted version was printed in 1961. Elias Lönnrot considered it to be a notable work. Lönnrot later continued from Ganader's starting point. The most notable of Ganader's works is his dictionary . The dictionary includes over 30,000 lexical entries which have Swedish and Latin explanations. There are also etymological explanations in his book. Although it was not published during his lifetime, it was finally published as a reprint between 1937 and 1940. Other works In 1780, Ganander published a thesis about the origin, way of life and language of the Romany. His national and scholarly interests applied to education in the late 18th century. Ganader published two of the first Finnish-language medical books ("The Home Pharmacy for the Country Man") and ("A Book of Animal Diseases"). There were many editions of these works still being used in the 19th century. References External links Yle, Suuret suomalaiset artikkeli Virtuaaliyliopiston artikkeli, jossa lähdeviitteitä ja luettelo Gananderin julkaisuista Rantsilan sivuilla Ganander Arviointi kirjasta: Nytt Finskt Lexicon hakemistoineen K. Ganander: Maan-Miehen Huone- ja Ko
https://en.wikipedia.org/wiki/Village%20files
Village files were military intelligence documents based on a card index system, with detailed data on every Arab village in Mandatory Palestine. Gathered by the SHAI, they were the basis of Haganah and Palmah operations during the 1940s. The files answered the need of combat intelligence for the number of men in the village, the number of weapons, the topography and so on, dealt with the research of traces of ancient Jews in the villages, and with the possibility of buying land from the villagers and settling it. Origins The suggestion for these files came from Luria Ben-Zion, an historian from the Hebrew University of Jerusalem, who wrote in 1940 to the Jewish National Fund (JNF) that "This would greatly help the redemption of the land". Yossef Weitz, the head of the JNF settlement department immediately suggested that they be turned into a "national project". Yitzhak Ben-Zvi suggested that, apart from topographically recording the layout of the villages, the project should also include exposing the "Hebraic origins" of each village. According to Ilan Pappé, in the early 1940s, topographers, (aerial) photographers and Orientalists worked on the files. Moshe Pasternak, who joined a data collection operation in 1940 said: "We had to study the basic structure of the Arab village. This means the structure and how best to attack it. In the military schools, I had been taught how to attack a modern European city, not a primitive village in the Near East. We could not compare it [an Arab village] to a Polish, or an Austrian one. The Arab village, unlike the European ones, was built topographically on hills. That meant we had to find out how best to approach the village from above or enter it from below. We had to train our 'Arabists' [the Orientalists who operated a network of collaborators] how best to work with informants." According to Gil Eyal, the information was rather gathered between 1945 and 1947 when between 600 and 1000 villages were "surveyed by scouts and informers as well as aerial reconnaissance". Purposes According to Pappé, later the files were updated and much more details of the inhabitants were added. Towards the end of the Mandatory period more military information was added, like the number of guards and the number and quality of arms in a village, next to the already present information on how best to attack a village. The final update in 1947 focused on creating lists of ‘wanted’ persons in each village. The main criteria for inclusion were participation in actions against the British and the Zionists, and affiliation with a Palestinian political party or leader. Typically 20 to 30 out of 1500 inhabitants were on the lists. According to Pappé in the late 1940s these files contained 'precise details [...] about the topographic location of each village, its access roads, quality of land, water springs, main sources of income, its sociopolitical composition, religious affiliations, names of its mukhtars, its relationship wit
https://en.wikipedia.org/wiki/Almajd%20TV%20Network
Al-Majd Network () is a group of general and specialized satellite television channels which includes five free-to-air channels and eight encrypted channels. The group has a strong Salafi Islamic orientation and is owned by Saudi businessman Fahad Abdulrahman Alshimeimri, with other partners. History Al-Majd Satellite Network was founded in November 2002. As of 2022, Broadcasting and production is done in Riyadh and Cairo. There were additional production and broadcasting offices in Dubai, Amman, Rabat, Baghdad, Damascus and Beirut, in addition to tens of productive companies. There used to be a live SMS chat in some channels until 2016. Free-to-air channels Al-Majd Satellite Channel: Al-Majd Network’s main channel. Al-Majd Qur'an Channel: The first 24-hour Holy Qur’an television channel in the world. Al-Majd Hadeeth Channel: The first TV channel in the world that focuses on the quotes of Prophet Muhammad, as well as Hadeeth-related content. Al-Ilmiya (Al-Majd Religious Sciences): One of the first educational TV channels in the Middle East, focusing on Religious Sciences. Radio Dal for Children: Considered by the network as the first children’s radio in the world. Radio Dal hasn’t been available as an FM radio station as of yet. Encrypted channels Al-Majd News Service (formerly known as “Al-Alam Al-Yaum”): The only world news service in Al-Majd Network as of now. Al-Majd Documentary Channel: The first documentary channel in the Arab World. Al-Majd Nature Channel: The first nature channel in the Arab World. Al-Majd Kids Channel (also known as “Majd”): Al-Majd Network’s main kids channel, which features mostly live-action children’s content. Basma: A 24/7 cartoon channel, and one of Al-Majd Network’s kids channels. Rawdah: The first channel in the Middle East that produces and airs educational content for children aged 2-5. Taghareed: A channel that specializes in children’s nasheeds. Masah: Al-Majd Network’s main variety & entertainment channel, with content that includes drama series. Al-Majd Zaman: Another variety & entertainment channel from Al-Majd Network, which airs some of the network’s archives. The channel has been aired annually throughout the summer since its TV launch in 2022. External links Islamic television networks Television channels and stations established in 2002 Television stations in Saudi Arabia Television stations in the Middle East and North Africa
https://en.wikipedia.org/wiki/Vissa
Vissa is an Indian Telugu-language television channel part of Raj Network. It was launched on 23 June 2003. Four brothers started Raj TV in 1994. The channel telecast some non-Telugu films which are dubbed from south language Tamil. The channel is named after their mother Vissalakshmi. It broadcasts mostly film based programs, pre-release events, interviews, news and talk shows. List of films Nagamma Naidu Vaaliddaru Premante Pranamistha Usha Kiranalu Hello My Dear Monisha Manthrikudu Maharaju Sivaputrudu Seetha Geetha Dhatithe Picnic Iddaru Mitrulu Agnikeratulu Sri Krishnadevarayalu Mosagadu Amma Nanna Jyothi Prema Bandham Golconda Abbulu Prabhanjanam Availability The channel in considered in Telugu language TV channels but due to some reasons most of DTH service are not adapted this channel so, currently this channel is available only in Airtel digital TV and Tata Play. Sister Channel Raj Musix Telugu Raj News Telugu Raj TV Raj Digital Plus Raj Musix Raj Musix Kannada Raj News Kannada Raj Musix Malayalam Raj News Malayalam References Telugu-language television channels Television channels and stations established in 2003 Television stations in Hyderabad
https://en.wikipedia.org/wiki/Intel%20P45
The P45 Express (codenamed Eaglelake) is a mainstream desktop computer chipset from Intel released in Q2 2008. The first mainboards featuring the P45 chipset were shown at CeBIT 2008. The P45 Express chipset supports Intel's LGA 775 socket and Core 2 Duo and Quad processors. It is a 65 nm chipset, compared to the earlier generation chipsets (P35, X38, X48) which were 90 nm. Features 1333/1066/800 MT/s front-side bus (FSB), most motherboard manufacturers claim support up to 1600 MT/s. PCI Express 2.0, 1 ×16 or 2 ×8 in CrossFire configuration. Dual-channel DDR2 memory up to 16 GiB addressable memory; officially up to 800 MHz, most motherboard manufacturers claim support up to 1200 MHz Dual-channel DDR3 memory up to 8 GiB addressable memory; officially up 1066 MHz, most motherboard manufacturers claim support up to 1333 MHz ICH10 / ICH10R southbridge Supports 45 nm processors See also List of Intel chipsets References External links P45 Express Chipset 82P45 Memory Controller Hub Intel P45 Express Chipset Overview P45
https://en.wikipedia.org/wiki/Raymie%20Stata
Raymond Paul "Raymie" Stata is an American computer engineer and business executive. Early life Stata received his bachelor's and master's degrees in Computer Science and Engineering from MIT, where he also earned his Ph.D. in 1996, under adviser John Guttag. Stata's father, Ray Stata, was founder and chairman of Analog Devices. Career After finishing his Ph.D., Stata worked for Digital Equipment Corporation's Systems Research Center, where he contributed to the AltaVista search engine. He was an assistant professor of Computer Science at the Baskin School of Engineering at UC Santa Cruz, and collaborated with the Internet Archive. In 2002, Stata founded Stata Laboratories. The company developed the Bloomba search-based e-mail client and the SAProxy anti-spam filter. Stata Labs was acquired by Yahoo! in 2004, for an undisclosed amount. Stata continued working for Yahoo!, and in 2010, became the company's chief technology officer, a position he held until he left the company in 2012. With Yahoo!, Stata co-developed a composition model for cloud-hosted serving applications, for which he was granted a patent. Stata was also involved early in Apache Hadoop, consulting with and eventually hiring its founders Doug Cutting and Mike Cafarella at Yahoo!. After leaving Yahoo! in 2012, Stata founded Altiscale, a company that provided Apache Hadoop-as-a-service marketed as "big data in the cloud". Altiscale was named a Cool Vendor in Big Data by Gartner for 2015. Stata served as Altiscale's CEO until 2016, when the company was acquired by the software company SAP for more than $125 million. Following SAP's acquisition, Stata became senior vice president of big data services for about a year. Since 2018, Stata served as product and technology advisor for Aqfer, an enterprise software company developing data marketing tools. Stata also serves on the board for technology companies Vanu and Gamalon. Stata is on the advisory council for QuakeFinder, a research and development group focusing on earthquake prediction. Until 2018, he served on the board of trustees for the Computer History Museum in Mountain View, California. Publications References 1968 births American computer businesspeople American technology chief executives American computer scientists Living people MIT School of Engineering alumni Businesspeople from Boston University of California, Santa Cruz faculty Yahoo! employees American chief technology officers
https://en.wikipedia.org/wiki/Linpus%20Linux
Linpus Linux is a Fedora Linux-based operating system created by the Taiwanese firm Linpus Technologies Inc. Linpus was designed specifically to fully support the Asian market, with full Unicode support for the Chinese and Japanese languages. A special version, Linpus Lite, was written to run on devices with lower-cost hardware such as netbooks. It has both an icon and tab-based "Simple mode", designed for new users; and, a conventional style "PC mode" for those wanting a more Microsoft Windowslike interface. It is targeted at handheld devices with smaller screens, and supports resolutions as low as VGA (640 × 480). The Acer Aspire One and Norhtec Gecko netbooks come with Linpus Lite Linux pre-installed, there is also a version of the Acer Revo 3610 and 3700 with Linpus Linux pre-installed. A version for normal desktop computers and servers is also available, as well as a Multimedia version called Linpus Media Center. The Media Center version offers an "Upgrade pack" to purchase patent licenses from MPEG-LA for DVD, MP3, WMV and a few other codecs. Nagware The Linpus system contains not only the free and open source operating system, but also Acer-specific "shareware" users classify this as "nagware," because it asks you to register on Acer's website and purchase a full version. The fact that the Acer distribution contains this software prevents the system from being considered a fully free, open operating system. References External links RPM-based Linux distributions Linux distributions used in appliances Taiwanese brands Linux distributions
https://en.wikipedia.org/wiki/Linos%20%28operating%20system%29
Linos is an embedded distribution of Linux with proprietary applications used by Aware Electronics in their A-BOOK products. It can only be obtained by purchasing a device containing the runtime code. It is used in the Elonex ONE. References Embedded Linux distributions Linux distributions
https://en.wikipedia.org/wiki/Nesting%20%28computing%29
In computing science and informatics, nesting is where information is organized in layers, or where objects contain other similar objects. It almost always refers to self-similar or recursive structures in some sense. Terminology Nesting can mean: nested calls: using several levels of subroutines recursive calls nested levels of parentheses in arithmetic expressions nested blocks of imperative source code such as nested if-clauses, while-clauses, repeat-until clauses etc. information hiding: nested function definitions with lexical scope nested data structures such as records, objects, classes, etc. nested virtualization, also called recursive virtualization: running a virtual machine inside another virtual machine In spreadsheets In a spreadsheet functions can be nested one into another, making complex formulas. The function wizard of the OpenOffice.org Calc application allows to navigate through multiple levels of nesting, letting the user to edit (and possibly correct) each one of them separately. For example: =IF(SUM(C8:G8)=0,"Y","N") In this Microsoft Excel formula, the SUM function is nested inside the IF function. First, the formula calculates the sum of the numbers in the cells from C8 to G8. It then decides whether the sum is 0, and it displays the letter Y if the sum is 0, and the letter N if it is not. Naturally, to allow the mathematical resolution of these chained (or better: nested) formulas, the inner expressions must be previously evaluated, and this outward direction is essential because the results that the internal functions return are temporarily used as entry data for the external ones. Due to the potential accumulation of parentheses in only one code line, editing and error detecting (or debugging) can become somehow awkward. That is why modern programming environments -as well as spreadsheet programs- highlight in bold type the pair corresponding to the current editing position. The (automatic) balancing control of the opening and closing parenthesis is known as brace match checking. In programming Control structures In structured programming languages, nesting is related to the enclosing of control structures one into another, usually indicated through different indentation levels within the source code, as it is shown in this simple BASIC function: function LookupCode(sCode as string) as integer dim iReturnValue as integer dim sLine, sPath as string sPath="C:\Test.dsv" if FileExists(sPath) then open sPath for input as #1 do while not EOF(1) line input #1, sLine if sCode=left(sLine, 3) then 'Action(s) to be carried out End if loop close #1 End if LookupCode=iReturnValue end function In this small and simple example, the conditional block “if... then... end if” is nested inside the “do while... loop” one. Some languages such as Pascal and Ada have no restrictions on declarations depending on the nesting level, allowing precisely nested subprog
https://en.wikipedia.org/wiki/USAspending.gov
usaspending.gov is a database of spending by the United States federal government. History Around the time of the Act's passage, OMB Watch, a government watchdog group, was developing a site that would do essentially everything the legislation required. Gary Bass, director of OMB Watch, contacted Robert Shea, associate director of the OMB, offering to help with development of the new site. Shea was initially reluctant to collaborate with Bass, in part because OMB Watch is typically critical of the OMB, but eventually it was determined that the government site would be based on what OMB Watch was developing, with the group being paid $600,000 for their technology. As of early 2008, the government's site offered the same data, API, and (for the most part) documentation as the OMB Watch site, fedspending.org. The Federal Funding Accountability and Transparency Act of 2006 delegated responsibility for creating the website to the Office of Management and Budget. On May 9, 2017, Steven Mnuchin, the United States Secretary of the Treasury, announced that he updated the site, providing a much broader view of government spending. It has been reported that the 2011 United States federal budget holds a substantial reduction in funding for the Electronic Government Fund, from which USASpending.gov draws its funding. See also System for Award Management (SAM.gov) References Further reading External links USASpending.gov – official government spending database Government procurement in the United States Government services web portals in the United States
https://en.wikipedia.org/wiki/Lilith%20%28Supernatural%29
Lilith is a fictional character on The CW Television Network's drama and horror television series Supernatural. The series' writers conceptualized her as a dangerous new adversary for series protagonists Sam and Dean Winchester to face, introducing her to stabilize the story arc in the third season by giving demons a new leader in the wake of the death of the villainous Azazel and maintaining her as the primary antagonist until the conclusion of the fourth season. During the third season, Lilith tries to kill Sam and Dean, ordering for their deaths at the hands of her minions. Early in the fourth season it is revealed that her goal is to free her maker, the fallen angel Lucifer, from his imprisonment in Hell. The protagonists' attempts to thwart her plan is the main plot of that season. As a "destroyer of children and seducer of men", the character initially possesses little girls but is later depicted as possessing young women in attempt by the writers to avoid showing violence towards children on-screen. The character received generally favorable reviews from critics, particularly for her role in "No Rest for the Wicked". In season 15, Lilith is resurrected by God from The Empty. Plot According to series creator Eric Kripke, the archangel Lucifer "twisted and mutilated" the human Lilith's soul into the first demon "to prove a point to God...that human souls were...inferior to God and the angels". Having been freed from Hell in the second season finale "All Hell Breaks Loose: Part Two", Lilith (Rachel Pattee) debuts in the final moments of the third season episode "Jus in Bello" as the current leader of an army of demons also unleashed from Hell; the first half of the season had established that after the death of the army general and previous series antagonist Azazel created a power vacuum, leading to power struggles between demonic factions, which is resolved when Lilith ultimately emerges as the victor. In her "Jus in Bello" appearance, she searches a police station for the series protagonists Sam and Dean Winchester, brothers who hunt supernatural creatures. Having just missed them, she proceeds to torture everyone in the station for nearly an hour after destroying the station in a massive explosion. The Winchesters' demonic ally Ruby explains that Lilith sees Sam as a rival, as he has demonic abilities and was intended—but unwilling—to lead Azazel's demon army. Lilith orders Sam's death in order to secure her position as the army's general, even tricking the thief Bela Talbot into making a failed attempt on Sam's life with the promise of releasing Bela from her Faustian deal, only to go back on her word and let Bela get dragged into Hell. With Dean having also sold his soul as part of a Faustian deal—one he made to save Sam's life—the brothers spend part of the season searching for the entity that holds the contract to Dean's soul and eventually learn from Bela that the demon in question is Lilith, who holds the contracts to all deals.
https://en.wikipedia.org/wiki/Terminal%20pager
A terminal pager, paging program or simply pager is a computer program used to view (but not modify) the contents of a text file moving down the file one line or one screen at a time. Some, but not all, pagers allow movement up a file. A popular cross-platform terminal pager is more, which can move forwards and backwards in text files but cannot move backwards in pipes. less is a more advanced pager that allows movement forward and backward, and contains extra functions such as search. Some programs incorporate their own paging function, for example bash's tab completion function. Examples more less pg most nano --view emacs -nw -e "(view-mode)" w3m References
https://en.wikipedia.org/wiki/Dan%20Dare%20%28disambiguation%29
Dan Dare is a British comic strip hero. The character featured in spin off media: Dan Dare: Pilot of the Future, a 1986 video game Dan Dare: Pilot of the Future (TV series), a 2002 computer animation television series Dan Dare may also refer to: Dan Dare (Fawcett Comics), a fictional detective featured in Fawcett Comics' Whiz Comics "Dan Dare (Pilot of the Future)", a song on Elton John's tenth studio album, Rock of the Westies Dan Dare, member of Australian New Wave band The Manikins
https://en.wikipedia.org/wiki/Altibox
Altibox is a unified brand name for Broadband, IPTV and VoIP services distributed in Norway and Denmark with over 35 local Norwegian and 6 Danish FTTH networks. Altibox was set up by Southwestern Norwegian multi-utility firm Lyse Energi in 2002 under the name Lyse Tele. The company subsequently changed its name to Altibox in 2009. Since 2002, the company has steadily been adding customers and distribution partners, with more than 360,000 homes connected. The vast majority of Altibox customers self-install (over 80 percent). In 2016, Altibox became the sponsor and namesake of the Altibox Norway Chess Tournament, an annual event that has been called the strongest chess tournament in the world. In December 2019, the company announced that it had bought all the shares in Skagenfiber, a provider of subsea cables from Norway to Denmark and Norway to Newcastle (UK). References External links Official site Arstechnica article Broadband TV news article Telecommunications in Norway Norwegian companies established in 2002
https://en.wikipedia.org/wiki/Seasonally%20adjusted%20annual%20rate
The seasonally adjusted annual rate (SAAR) is a rate that is adjusted to take into account typical seasonal fluctuations in data and is expressed as an annual total. SAARs are used for data affected by seasonality, when it could be misleading to directly compare different times of the year. SAARs are often used for car sales. Other examples of when SAARs could be used are occupancy rates at ski resorts, which are higher in the winter, or sales of ice cream, which are higher in the summer. Sales between seasons can be more easily compared using seasonally adjusted rates. The SAAR is calculated by dividing the unadjusted month rate for the month by its seasonality factor and multiplying by 12 to create an annual rate. (Quarterly data would be multiplied by 4.) References External links Investopedia's entry on the SAAR Moody's Analytics Buffet: SAAR What Does Seasonally Adjusted Annual Rate (SAAR) Mean? Seasonal adjustment, Duke University See also Seasonal adjustment Economic data Seasonality Time series
https://en.wikipedia.org/wiki/Cray%20EL90
The Cray EL90 series was an air-cooled vector processor supercomputer first sold by Cray Research in 1993. The EL90 series evolved from the Cray Y-MP EL minisupercomputer, and is compatible with Y-MP software, running the same UNICOS operating system. The range comprised three models: EL92, with up to two processors and 64 megawords (512 MB) of DRAM in a deskside chassis: dimensions 42×23.5×26 inches or 1050×600×670 mm (height × width × depth) and 380 lb/172 kg in weight. EL94, with up to four processors and 64 megawords (512 MB) of DRAM, in the same cabinet as the EL92. EL98, a revised Y-MP EL with up to eight processors and 256 megawords (2 GB) of DRAM in a Y-MP EL-style cabinet (62×50×32 inches or 2010×1270×810 mm, 1400 lb/635 kg in weight). The EL90 series Input/Output Subsystem (IOS) was based on the VMEbus and a Heurikon HK68 Motorola 68000-based processor board (or IOP). The IOP also provided the system's serial console. All EL90 models could be powered from regular mains power. The EL90 series was superseded by the Cray J90 series. References Fred Gannett's Cray FAQ Cray EL boot sequence Computer-related introductions in 1993 El90 Vector supercomputers
https://en.wikipedia.org/wiki/Cray%20XT5
The Cray XT5 is an updated version of the Cray XT4 supercomputer, launched on November 6, 2007. It includes a faster version of the XT4's SeaStar2 interconnect router called SeaStar2+, and can be configured either with XT4 compute blades, which have four dual-core AMD Opteron processor sockets, or XT5 blades, with eight sockets supporting dual or quad-core Opterons. The XT5 uses a 3-dimensional torus network topology. XT5 family The XT5 family run the Cray Linux Environment, formerly known as UNICOS/lc. This incorporates SUSE Linux Enterprise Server and Cray's Compute Node Linux. The XT5h (hybrid) variant also includes support for Cray X2 vector processor blades, and Cray XR1 blades which combine Opterons with FPGA-based Reconfigurable Processor Units (RPUs) provided by DRC Computer Corporation. The XT5m variant is a mid-ranged supercomputer with most of the features of the XT5, but having a 2-dimensional torus network topology and scalable to 6 cabinets. In the fall of 2008, Cray delivered the Jaguar 1.3 petaflops XT5 system to National Center for Computational Sciences at Oak Ridge National Laboratory. The system, with over 150,000 processing cores, was the second fastest system in the world for the LINPACK benchmark, the fastest system available for open science and the first system to exceed a petaflops sustained performance on a 64-bit scientific application. Jaguar underwent an upgrade to 224,256 cores in 2009, after which its performance jumped to 1.75 petaflops, taking it to the number one position in the 34th edition of the TOP500 list in fall 2009. It remained number one in the June 2010 edition, but in October 2010 was surpassed by the Chinese Tianhe-1A, which achieved a performance of 2.57 petaflops. Another XT5 system, Kraken, with 112,896 cores and 1.17 petaflops, as of June 2012 was at position number 21 in the TOP500 list. References External links Cray Introduces Next-Generation Supercomputers Cray Linux Environment Xt5 Petascale computers X86 supercomputers
https://en.wikipedia.org/wiki/EPIN
The European Policy Institutes Network (EPIN) is a network of 31 think tanks from most EU member states and beyond. Its main focus is on current EU and European political and policy debates. EPIN aims to contribute to the debate on the future of Europe through up to the minute, expert analysis and commentary and through providing easy access to understanding the different national debates. EPIN is coordinated by the Centre for European Policy Studies in Brussels, Belgium. History EPIN is a network of European think tanks and policy institutes with members in most member states and candidate countries of the European Union. It was established in 2002 during the constitutional Convention on the Future of Europe with partial funding under the PRINCE 'Future of Europe' programme of the European Commission. Then, its principal role was to follow the works of the Convention. More than 30 conferences in member states and candidate countries were organised in the following year. Since its founding CEPS has served as the network's coordinator. With the conclusion of the Convention, the funding ended. Yet, CEPS and other participating institutes decided to keep the network in operation. Since then CEPS provides financial support to the network. EPIN has continued to follow the constitutional process in all its phases: (1) the intergovernmental conference of 2003–2004; (2) the ratification process of the Constitutional Treaty; (3) the period of reflection; and (4) the intergovernmental conference of 2007. EPIN continued to follow (6 ) the ratification process of the Lisbon Treaty and currently entered into the next (6) phase on the implementation of the Treaty. Status quo Currently there are 31 EPIN members from 26 countries, also from countries outside of the EU. The 'hard core' work of the network is based on the cooperation of about 15 most active institutes. The member institutes are quite diverse in size and structure, but are all characterised by political independence and the absence of any predetermined point of view or political affiliation. Since 2005, an EPIN 'Steering Committee' takes the most important decisions. Currently there are seven member institutes: CEPS, DIIS (Denmark), ELCANO (Spain), Notre Europe (France), SIEPS (Sweden), HIIA (Hungary) and Clingendael (Netherlands). EPIN organises three events in EU per year; one of them takes place in Brussels. The network publishes joint publications on topical issues (e.g. flexible integration, Europe of citizens). EPIN focuses on institutional reform of the Union, but other issues are also addressed. The network follows preparations for the European elections, the EU's communication policy, and the political dynamics after enlargement, as well as EU foreign policy and justice and home affairs. Achievements EPIN is a network that offers its member institutes the opportunity to contribute to the 'European added-value' for researchers, decision-makers and citizens. The network provides a p
https://en.wikipedia.org/wiki/Global%20Traffic%20Network
Global Traffic Network is a traffic reporting service that provides reports to radio and television stations across Australia, Canada, Brazil and the United Kingdom. The company was formed in 2005 by principals from Westwood One and Metro Networks, both of which provide direct traffic and news programming to their affiliate stations in the U.S. Global Traffic Network also has five subsidiaries, Canadian Traffic Network, Australian Traffic Network, Global Traffic Network UK, United States Traffic Network and the Brazilian Traffic Network. Global Traffic Network was established to be a worldwide aviation company providing helicopter traffic and news reports on the radio and television. It is the leading vendor for radio traffic reports in Canada and Australia. Global Traffic Network is also attempting to expand its market reach in the televised media through its Australian subsidiary. Combined with the radio affiliates, Global is the dominant ENG helicopter vendor in Australia. Global Traffic’s media reach, as a helicopter company, is the largest in the world, an idea first hatched by vendors of Metro Networks in 1999. History Global Traffic Network was incorporated in Delaware in May 2005 by William L. Yde, III, who had sold a traffic company to billionaire David I Saperstein, the former CEO of Metro Networks, in 1996. Yde, who had been living in Las Vegas, Nevada assembled a management group from within Metro Networks and Westwood One, including Shane Coppola, Westwood’s CEO, and Gary Worobow, who was Westwood One’s general counsel. Yde united four helicopter traffic companies that had been operating in Australia, Canada and Europe. Those four helicopter companies are now subsidiaries of the parent, Global Traffic Network. Although Global Traffic Network was originally established to serve only the Canadian provinces, Australia and Europe, the company signed advertising and broadcast management agreements with Westwood One and Metro Networks in November 2005, essentially making Global Traffic Network the aviation arm of Westwood and Metro. Global Traffic Network now owns dozens of Robinson R44 helicopters to service affiliate contracts in the US, Canada, Australia and Europe, according to the 2007 Rotor Roster, a helicopter industry publication that reports annually on the ownership and registration of rotorcraft. In December 2016 Global Traffic Network acquired the assets of Radiate Media, a US provider of traffic reports to American radio and television stations. Radiate Media was renamed US Traffic Network (USTN). Capitalization and investment In November 2005, Metro Networks, which is a subsidiary of Westwood One, extended a $2-million dollar loan to Global Traffic Network in order to help capitalize the company, according to financial records filed by Global Traffic Network with the U.S. Securities and Exchange Commission (SEC. Global Traffic Network then began the process of an initial public offering, and in March 2006 the c
https://en.wikipedia.org/wiki/The%20Science%20Network
The Science Network (TSN) is a non-profit virtual forum dedicated to science and its impact on society. It was initially conceived in 2003 by Roger Bingham and Terry Sejnowski as a cable science TV network modeled on C-SPAN. TSN later became a global digital platform hosting videos of lectures from scientific meetings and long form one-on-one conversations with prominent scientists and communicators of science, including Neil deGrasse Tyson, V.S. Ramachandran, Helen S. Mayberg, and Barbara Landau. TSN has also sponsored and co-sponsored scientific forums, such as Stem cells: science, ethics and politics at the crossroads, held at the Salk Institute in 2004 and the Beyond Belief conference series. Beyond Belief conference series TSN's signature series Beyond Belief was conceived to bring together a community of scientists, philosophers, scholars from the humanities, and social commentators. Speakers at these meetings have included Steven Weinberg, Richard Dawkins, Sam Harris, Harry Kroto, Neil deGrasse Tyson, and Stuart Kauffman. So far, the following three Beyond Belief conferences were organized: 2006: Science, Religion, Reason and Survival Beyond Belief: Science, Religion, Reason and Survival, the first of The Science Network's annual Beyond Belief symposia, held from November 5 to November 7, 2006, was described by The New York Times, as "a free-for-all on science and religion," which seemed at times like "the founding convention for a political party built on a single plank: in a world dangerously charged with ideology, science needs to take on an evangelical role, vying with religion as teller of the greatest story ever told." According to participant Melvin Konner, however, the event came to resemble a "den of vipers” debating the issue, "Should we bash religion with a crowbar or only with a baseball bat?”<ref name = "nyt">[https://www.nytimes.com/2006/11/21/science/21belief.html?n=Top/Reference/Times%20Topics/People/T/Tyson,%20Neil%20DeGrasse&_r=2&pagewanted=all A Free-for-All on Science and Religion," George Johnson, New York Times, Section F, Page 1, November 21, 2006]</ref> New Scientist summed up the topics to be discussed as a list of three questions: Can science help us create a new rational narrative as poetic and powerful as those that have traditionally sustained societies? Can we treat religion as a natural phenomenon? Can we be good without God? And if not God, then what? Speakers included physicists Steven Weinberg, Lawrence Krauss, Philosopher/author Sam Harris, biologist Joan Roughgarden, Michael Shermer of Skeptic Magazine, anthropologist Scott Atran and astrophysicist Neil deGrasse Tyson. 2007: Enlightenment 2.0Beyond Belief: Enlightenment 2.0 was the second annual symposium and was held from 31 October to 2 November 2007 at the Frederic de Hoffmann Auditorium of the Salk Institute for Biological Studies. The conference was released on a five-disc DVD series in 2007. 2008: Candles in the DarkBeyond Belief: C
https://en.wikipedia.org/wiki/Stargate%20Atlantis%20%28season%201%29
The first season of the television series Stargate Atlantis commenced airing on the Sci Fi Channel in the United States on July 16, 2004, concluded on The Movie Network in Canada on January 31, 2005, and contained 20 episodes. The show was a spin off of sister show, Stargate SG-1. Stargate Atlantis re-introduced supporting characters from the SG-1 universe, such as Elizabeth Weir and Rodney McKay among others. The show also included new characters such as Teyla Emmagan and John Sheppard. The first season is about a military-science expedition team discovering Atlantis and exploring the Pegasus Galaxy. However, there is no way to return home, and they inadvertently wake a hostile alien race known as the Wraith, whose primary goal is to gather a fleet to invade Atlantis and find their new "feeding ground", Earth. The two-hour premiere "Rising", which aired on July 16, 2004, received Sci Fi Channel's highest-ever rating for a series premiere and episode ever released, it is also the most watched broadcast release ever released by the Sci Fi Channel in the United States. The average viewing rate for the first ten episodes were around 3-4 million in the United States. The series was developed by Brad Wright and Robert C. Cooper, who also served as executive producers. Season one regular cast members included Joe Flanigan, Torri Higginson, Rachel Luttrell, Rainbow Sun Francks, and David Hewlett. Cast Starring Joe Flanigan as Major John Sheppard Torri Higginson as Dr. Elizabeth Weir Rachel Luttrell as Teyla Emmagan With Rainbow Sun Francks as First Lieutenant Aiden Ford And David Hewlett as Dr. Rodney McKay Episodes Episodes in bold are continuous episodes, where the story spans over 2 or more episodes. Production For "Rising", the Pemberton Glacier in British Columbia doubled for Antarctica during the opening flying sequence. Simon, Elizabeth's fiancé in "Rising" and "Home", was played by Garwin Sanford, who had previously played Narim on Stargate SG-1. Mario Azzopardi makes his return to the Stargate franchise in "Thirty-Eight Minutes". He had the distinctive honor of directing the pilot episode of Stargate SG-1, "Children of the Gods." This is his first time directing an episode of the franchise since the Season 1 Episode "Cor-Ai." Mario Azzopardi (as of December 2006) has only directed Season 1 Episodes of both SG-1 and Atlantis. "Thirty-Eight Minutes" is the only episode in both SG-1 and Atlantis to actually occur in real-time; between the opening of the Stargate and the resolution, 38 minutes of screentime do occur. Courtenay J. Stevens, who appears in "Childhood's End", had originally played the role of Lieutenant Elliot in Stargate SG-1, appearing in the Season 5 episodes "Proving Ground", "Summit" and "Last Stand". Writer Martin Gero compared Ares in "Childhood's End" to a villain in The Incredibles. In the scene of the final confrontation with Major John Sheppard, he began "monologuing," which is a key feature of villains in th
https://en.wikipedia.org/wiki/Cray%20XMS
The Cray XMS was a vector processor minisupercomputer sold by Cray Research from 1990 to 1991. The XMS was originally designed by Supertek Computers Inc. as the Supertek S-1, intended to be a low-cost air-cooled clone of the Cray X-MP with a CMOS re-implementation of the X-MP processor architecture, and a VMEbus-based Input/Output Subsystem (IOS). The XMS could run Cray's UNICOS operating system. Supertek were acquired by Cray Research in 1990, and the S-1 was rebadged XMS by Cray. Its processor had a 55 ns clock period (18.2 MHz clock frequency) and 16 megawords (128 MB) of memory. The CRAY XMS system was the first CRI computer system to be supported by removable disk drives. Serial 5011, on display, was used for marketing purposes in the Eastern Region. It traveled for over 80,000 miles during its short working life and appeared at many trade shows. The XMS was a short-lived model, and was superseded by the Cray Y-MP EL, which was under development by Supertek (as the Supertek S-2 and briefly as the Cray YMS) at the time of the Cray acquisition. Though powerful for its time, the CRAY XMS only had half the processing power of Microsoft's original Xbox gaming console. References Fred Gannett's Cray FAQ Chippewa Falls Museum of Industry & Technology: Cray Computer Systems Cray in Deal To Acquire Supertek, New York Times Computer-related introductions in 1990 Xms Vector supercomputers
https://en.wikipedia.org/wiki/Supertek%20Computers
Supertek Computers Inc. was a computer company founded in Santa Clara, California in 1985 by Mike Fung, an ex-Hewlett-Packard project manager, with the aim of designing and selling low-cost minisupercomputers compatible with those from Cray Research. Its first product was the Supertek S-1, a compact, air-cooled, CMOS clone of the Cray X-MP vector processor supercomputer running the CTSS (Cray Time Sharing System) operating system, and later a version of Unix. This was launched in 1989; although Supertek had raised US$21.4 million in venture capital, only $5 million of this was needed to develop the S-1. Only ten units were sold before Supertek was acquired by Cray Research in 1990. The S-1 was subsequently sold for a brief time by Cray as the Cray XMS. At the time of the acquisition the Supertek S-2, a clone of the Cray Y-MP, was under development. This was eventually launched as the Cray Y-MP EL in 1992. References Cray 1985 establishments in California 1990 disestablishments in California American companies established in 1985 American companies disestablished in 1990 Companies based in Santa Clara, California Computer companies established in 1985 Computer companies disestablished in 1990 Defunct companies based in the San Francisco Bay Area Defunct computer companies based in California Defunct computer companies of the United States Defunct computer hardware companies Technology companies based in the San Francisco Bay Area Vector supercomputers
https://en.wikipedia.org/wiki/Z2
Z2 may refer to: Z2 (computer), a computer created by Konrad Zuse Z2 (company), video game developer Z2 Comics, a publisher of graphic novels , the quotient ring of the ring of integers modulo the ideal of even numbers, alternatively denoted by Z2, the cyclic group of order 2 GF(2), the Galois field of 2 elements, alternatively written as Z2 Z2, the standard axiomatization of second-order arithmetic Z² (album), an album by Devin Townsend German destroyer Z2 Georg Thiele, a Type 1934 destroyer in the German Kriegsmarine USS Ringgold (DD-500), a destroyer transferred to the German Navy as Z-2 in 1959 Westinghouse Airships Z-2 blimp prototype for the U.S. Navy Kawasaki Z2, a motorcycle RAID-Z2, a way to combine multiple disk drives in a computer Zelda II: The Adventure of Link, the second video game in the Legend of Zelda series Zork II, a computer game A wireless speaker system from Bowers & Wilkins Philippines AirAsia, an airline based in Pasay, Philippines The Sony Xperia Z2, an Android smartphone Zebraman 2: Attack on Zebra City, a 2010 film Zoolander 2, a 2016 film
https://en.wikipedia.org/wiki/Convention%20over%20Code
Convention over Code is a design approach for programming languages where the conventional use of a feature is taken into consideration when defining the default semantics of the feature. Similar to Convention over Configuration, if a keyword can be implied by its absence due to convention, it becomes less a part of the idea the coder is expressing and a part of the hidden implementation. A common, notorious example is found in Java and C#. We find the keyword public infused throughout a typical Java code excerpt, and in the case of methods this access modifier implies public scope access. In practice, more methods use public scope access than the other three: private, protected and package protected (which happens to be the actual Java default). While a matter of opinion and much debate by programmers that love to be explicit about everything, it is clear that leaving out scope access keywords altogether takes very little away from the actual expression of an idea in code, because it has nothing to do with the idea at all, it is an attribute of the implementation of an idea. Convention over Code means we would make public the default for methods, and make better use of keyword Huffman coding in language design. See also Convention over Configuration Ruby on Rails Spring Framework References Object-oriented programming
https://en.wikipedia.org/wiki/AAG%20TV
AAG TV ( ) was a youth entertainment channel in Pakistan, owned by Independent Media Corporation. Launched in 2006 by Geo Television Network, it was associated with Fire Records, a record label in Pakistan. Certain notable artists within the Pakistani music industry were signed by Fire Records. In 2013, Aag TV shut down in the United Kingdom and Ireland, and was replaced by Geo Tez. VJ shows 12 se 2 3 To 5 3 Min Report 7,20 AAG 10 AAG Exclusive Azfar Mani Show Baji Online Blog Buster Cell 224 Curtain Call Click Teen Covers Dreamers Drift 360 Ishrat Baji Fire Starter Fireworks Fire Station Hun Das (live) Super Duper Gana (live) Iqbal Ka Pakistan Khel Khel Mein VJ Mix VIPs Only Meter TV Meter Down Milk Shiekh Pick and Choose with Fuse Papoo Yaar Thori Si Siyasat Weekend with Mahira Khan See also List of music channels in Pakistan GEO News GEO Super List of Pakistani television stations References External links Official site Geo TV Defunct television channels Television stations in Karachi Foreign television channels broadcasting in the United Kingdom
https://en.wikipedia.org/wiki/IL2CPU
IL2CPU (IL To CPU) is an ahead-of-time (AOT) compiler for .NET that is written using one of its Common Intermediate Language compliant languages (C#). It translates Common Intermediate Language to bare metal machine code. IL2CPU is the primary compilation component of the Cosmos Project, and is developed by the same team. History IL2CPU was created in 2005 by the Cosmos team. It was originally designed for the .NET Framework, but has since been upgraded to .NET Core, which is now known as just .NET. , it is planned to be superseded by .NET's native ahead-of-time (AOT) compiler, NativeAOT, however it is still in active development. Technical details IL2CPU is a console program invoked by the Cosmos build process. It takes in a dynamic link library (DLL) file, systematically scans its opcodes and outputs x86 instructions to be consumed by one of Cosmos's output methods, e.g. to create an ISO disk image file or to be booted over the network via PXE. See also Cosmos .NET Mono Bartok Open CIL JIT External links Free software programmed in C Sharp Free compilers and interpreters Beta software
https://en.wikipedia.org/wiki/List%20of%20LB%26SCR%20A1%20class%20locomotives
Below are the names and numbers of the steam locomotives that comprised the LB&SCR Class A1/A1X, which ran on the London, Brighton and South Coast Railway, and latterly the Southern Railway network. The original names mainly denoted various places served by the LB&SCR. Fleet References Sources A1! 0-6-0T locomotives LbandScr A1 Class Locomotives LbandScr A1 Class Locomotives
https://en.wikipedia.org/wiki/Emergency%20brake
Emergency brake can refer to: Cars and motor vehicles Autonomous emergency braking (AEB) in a collision avoidance system, which engages the main braking system in automobiles when a computer detects an imminent collision Advanced emergency braking system, where brakes are applied automatically in case of emergency Emergency brake assist (EBA or BA), which increases braking effectiveness when a human driver executes a panic stop Parking brake or hand brake in automobiles, which can also be used in case of failure of the main braking system Planes Autobrake, a system for automating braking during takeoff and landing of airplanes Trains Emergency brake (train), a term which can refer to a stronger-than-normal braking level, a separate backup braking system, or the lever used to engage the backup braking system Train protection system, which engages an emergency brake in dangerous situations
https://en.wikipedia.org/wiki/Poble%20Sec%20station
Poble Sec is a station of the Barcelona Metro network located in the neighbourhood of the same name, in the district of Sants-Montjuïc, Barcelona. It is served by L3 (green line), and was previously known as Parlamento. The station is located directly under Avinguda del Paral·lel between Carrer de Manso and Carrer del Parlament. It can be accessed from entrances in Carrer de Manso and Carrer de Teodor Bonaplata. The platforms are long each and are one next to another, albeit separated by a wall. The station opened in 1975, along with the other stations of the section of L3 between Paral·lel and Sants Estació stations. This section was originally operated separately from L3 and known as L3b. The station adopted its current name in 1982 at about the same time that L3b was merged with L3 proper. Future plans are for L2, which currently terminates one stop down the L3 at Paral·lel station, to be diverted into new platforms at Poble Sec. L2 will then continue to a terminus at Barcelona Airport, and Poble Sec will become an interchange station between L2 and L3. See also List of Barcelona Metro stations References External links Trenscat.com Barcelona Metro line 2 stations Barcelona Metro line 3 stations Railway stations in Spain opened in 1975 Transport in Sants-Montjuïc
https://en.wikipedia.org/wiki/Cray%20S-MP
The Cray S-MP was a multiprocessor server computer sold by Cray Research from 1992 to 1993. It was based on the Sun SPARC microprocessor architecture and could be configured with up to eight 66 MHz BIT B5000 processors. Optionally, a Cray APP matrix co-processor cluster could be added to an S-MP system. The S-MP was originally designed by FPS Computing as the FPS Model 500EA. FPS were acquired by Cray Research in 1991, becoming Cray Research Superservers Inc., and the Model 500EA was relaunched by Cray in 1992 as the S-MP. The S-MP was a short-lived model, and was superseded by the Cray CS6400. References New Computer by Cray Research Uses Sun Processor, New York Times Cockcroft, Adrian and Pettit, Richard (1998), Sun Performance and Tuning: Java and the Internet, Sun Microsystems. Smp Supercomputers
https://en.wikipedia.org/wiki/Surgical%20planning
Surgical planning is the preoperative method of pre-visualising a surgical intervention, in order to predefine the surgical steps and furthermore the bone segment navigation in the context of computer-assisted surgery. The surgical planning is most important in neurosurgery and oral and maxillofacial surgery. The transfer of the surgical planning to the patient is generally made using a medical navigation system. Principles of surgical planning The imagistic dataset used for surgical planning is mainly based on a CT or MRI. In oral and maxillofacial surgery, a different, more "traditional" surgical planning can be used for orthognatic surgery, based on cast models fixed into an articulator. History of the concept In order to make a surgical planning, one would need a 3D image of the patient. The starting point was made by G. Hounsfield in the 1970s, by using CT in order to record data about the anatomical situation of the patients. In the 1980s, advances were made by the radiologist M. Vannier and his team, by creating the first computed three-dimensional reconstruction from a CT dataset. In the early 1990s, the surgical planning was performed by using stereolithographic models. During the late 1990s, the first full computer-based virtual surgical planning was made for osteotomies, and then transferred to the operating theatre by a navigation system. Currently 3D Printed models are also used to plan a procedure and improve patient outcomes. The first commercially available neurosurgical planning systems appeared in the 1990s (the StealthStation by Medtronic, the VectorVision by Brainlab). As newer imaging modalities emerged providing increasing anatomical and functional detail for the patient in the 2000s, these surgical planning systems started to incorporate virtual reality technology to facilitate the visualisation and manipulation of the 3D data. One example of such systems is the Dextroscope, manufactured by Volume Interactions Pte Ltd. The Dextroscope is mostly used in the planning of complex neurosurgical procedures. References Oral and maxillofacial surgery Health informatics Radiology Tomography Computer-assisted surgery
https://en.wikipedia.org/wiki/3D%20reconstruction
In computer vision and computer graphics, 3D reconstruction is the process of capturing the shape and appearance of real objects. This process can be accomplished either by active or passive methods. If the model is allowed to change its shape in time, this is referred to as non-rigid or spatio-temporal reconstruction. Motivation and applications The research of 3D reconstruction has always been a difficult goal. By Using 3D reconstruction one can determine any object's 3D profile, as well as knowing the 3D coordinate of any point on the profile. The 3D reconstruction of objects is a generally scientific problem and core technology of a wide variety of fields, such as Computer Aided Geometric Design (CAGD), computer graphics, computer animation, computer vision, medical imaging, computational science, virtual reality, digital media, etc. For instance, the lesion information of the patients can be presented in 3D on the computer, which offers a new and accurate approach in diagnosis and thus has vital clinical value. Digital elevation models can be reconstructed using methods such as airborne laser altimetry or synthetic aperture radar. Active methods Active methods, i.e. range data methods, given the depth map, reconstruct the 3D profile by numerical approximation approach and build the object in scenario based on model. These methods actively interfere with the reconstructed object, either mechanically or radiometrically using rangefinders, in order to acquire the depth map, e.g. structured light, laser range finder and other active sensing techniques. A simple example of a mechanical method would use a depth gauge to measure a distance to a rotating object put on a turntable. More applicable radiometric methods emit radiance towards the object and then measure its reflected part. Examples range from moving light sources, colored visible light, time-of-flight lasers to microwaves or 3D ultrasound. See 3D scanning for more details. Passive methods Passive methods of 3D reconstruction do not interfere with the reconstructed object; they only use a sensor to measure the radiance reflected or emitted by the object's surface to infer its 3D structure through image understanding. Typically, the sensor is an image sensor in a camera sensitive to visible light and the input to the method is a set of digital images (one, two or more) or video. In this case we talk about image-based reconstruction and the output is a 3D model. By comparison to active methods, passive methods can be applied to a wider range of situations. Monocular cues methods Monocular cues methods refer to using one or more images from one viewpoint (camera) to proceed to 3D construction. It makes use of 2D characteristics(e.g. Silhouettes, shading and texture) to measure 3D shape, and that's why it is also named Shape-From-X, where X can be silhouettes, shading, texture etc. 3D reconstruction through monocular cues is simple and quick, and only one appropriate digital image is ne
https://en.wikipedia.org/wiki/RoboCop%20%281988%20video%20game%29
RoboCop is a beat 'em up / run and gun video game developed and published by Data East for arcades in 1988 based on the 1987 film of the same name. It was sub-licensed to Data East by Ocean Software, who obtained the rights from Orion Pictures at the script stage. Data East and Ocean Software subsequently adapted the arcade game for home computers. The game was a critical and commercial success. The arcade game was the highest-grossing arcade game of 1988 in Hong Kong, and reached number-two on Japan's monthly Game Machine arcade charts. On home computers, the game sold over copies worldwide, and it was especially successful in the United Kingdom where it was the best-selling home computer game of the 1980s. Gameplay The gameplay is similar to Data East's arcade game Bad Dudes Vs. DragonNinja, released earlier the same year. Robocop includes elements from both beat 'em up and run and gun video games. Release In 1988, Ocean adapted Data East's Robocop arcade game for 8-bit home computers, converting much of the arcade game while also adding original content to make it different from the arcade original. This version was produced for the Commodore 64, MSX, ZX Spectrum, TRS-80 Color Computer 3, Amstrad CPC, and MS-DOS, meaning that home computers ended up with two different versions of Robocop for North American and European audiences. Ports for the Apple II, Amiga, and Atari ST; ports for DOS, NES, and TRS-80 Color Computer 3 followed in 1989. The Apple II and IBM PC ports were developed by Quicksilver Software, while the Amiga and Atari ST versions were developed directly by Ocean. The NES version was developed by Sakata SAS Co, and Ocean developed and published a version for the Game Boy in 1990. A port of the game for the Atari Jaguar was planned but never released. Data East published the game in North America. Reception RoboCop was a commercial success in arcades, especially in Hong Kong where it was the highest-grossing arcade game of 1988. In Japan, Game Machine listed RoboCop on their February 1, 1989 issue as being the second most-successful table arcade unit of the month. On home computers, the game sold over copies worldwide. It was especially successful in the United Kingdom, where it was the best-selling home computer game of the 1980s. The ZX Spectrum version in particular was the best-selling home video game of 1989. The ZX Spectrum RoboCop was one of the biggest selling games of all time on that platform and remained in the Spectrum software sales charts for over a year and a half; it entered the charts in December 1988 and was still in the top five in February 1991. It also topped the UK all-format charts for a record 36 weeks until it was knocked off the number one position by Indiana Jones and the Last Crusade in August 1989. The arcade game was critically well-received. The ZX Spectrum version also achieved critical acclaim, receiving a CRASH Smash award from CRASH, 94% in Sinclair User and Your Sinclair gave 8.8
https://en.wikipedia.org/wiki/MSI%20Wind%20Netbook
The MSI Wind Netbook was a family of subnotebooks / netbooks designed by Micro-Star International (MSI). Wind stands for "Wi-Fi Network Device". The first model was announced at CeBIT 2008, and first listed for pre-orders on May 9, 2008. While initially 8.9- and 10.1-inch screen versions existed, as of 2010 only the 10.1" remained, with a resolution of 1024 × 600. While most models had 1 GB of RAM, some had 2 GB, and hard disks ranged from 80 GB on the oldest to 250 GB on the newest models. Also featured were Bluetooth, WLAN and a 1.3 megapixel camera. The Wind PC was MSI's response to the successful Asus Eee PC. The keyboard was 92% of full-size. Now available by MSI are 10-inch and 7-inch Wind Pad tablets using the Android operating system. OEM versions When the original Wind U100 was released, many original equipment manufacturer versions of the Wind were also released, under different names. Advent 4211, 4222 as an in-store brand for PC City, PC World and other Dixons Stores Group retailers in Europe and the UK. Ahtec LUG N011 in the Netherlands, Spain and Belgium. Offered with SUSE Linux, Windows XP or no operating system. Has the same design as the original Wind (white). Comes without logo on the case. Can be upgraded at purchase. Averatec Buddy First model of Pico in Indonesia with a 160 GB HDD, versions with and without Bluetooth. Certified Data U100 in Canada, sold at London Drugs. LG X110, marketed in Argentina, Brazil (modelos x110-1010 and 1000) and Sweden Hannspree HANNSnote with a 6-cell battery and a 160 GB HDD Medion Akoya Mini in Germany, Switzerland, Austria, the Netherlands, Belgium, Denmark, Spain, France, the United Kingdom, Ireland, Poland and Australia (as of 23 October 2008) (the Medion Akoya Mini is a slightly different containing a different wireless card, no Bluetooth (Aust. model features mini Bluetooth dongle), and 0.3 Mpx camera). Mivvy M310 in the Czech Republic. but with 2 GB of RAM and a 120 GB HDD. Mouse Computer LuvBook U100 in Japan. Multirama HT Xpress Book in Greece with 160 GB HDD NTT Corrino 101I and Aristo Pico i300 in Poland Positivo Mobo White in Brazil, with 4 models: 1000, 1050, 1070 and 1090. All sport Intel Atom Processors and range from 512 MB RAM / 80 GB HDD (Mobo White 1000) to 1 GB RAM and 160 GB HDD (Mobo White 1090). Proline U100 in South Africa. ProLink Glee TA-009 in Singapore with touchpad buttons positioned by the side and optional 3G HSDPA connectivity. RoverBook Neo U100 in Russia with 120 GB or 160 GB HDD Terra 10G in Europe with various option Tsunami Moover T10 in Portugal (XP version only) Some OEM versions are offered in different colors to the original MSI Wind, apart from the Tsunami Moover (white only), the Mobo White and the Ahtec LUG N011 (white only). Specifications Customization The MSI Wind netbooks (specifically the MSI Wind U100) have been subject to customization; especially as Hackintoshes. Though many other netbooks can also be installed with
https://en.wikipedia.org/wiki/Dangerous%20Dave%20in%20the%20Haunted%20Mansion
Dangerous Dave in the Haunted Mansion (also known as Dangerous Dave 2 and under the Froggman title, Rooms of Doom) is a 1991 sequel of the computer game Dangerous Dave. It was created by John Romero, John Carmack, Adrian Carmack and Tom Hall. It was developed on the Shadow Knights engine with some extra code for smoother character movement. Also an auto-loading shotgun debuts in the game. Many of the features that debuted in this game were carried over to its sequels, Dangerous Dave's Risky Rescue and Dave Goes Nutz! Gameplay Dave's mission is to rescue his brother Delbert, lost in the haunted mansion teeming with creatures. To do this, he needs to complete eight levels, going through the door on each level. A shotgun can be used to fight such monsters as zombies, ghosts, slimes and others. Levels are packed with various traps and shiny diamonds. Release In 1993 the game was re-released by the short lived publisher Froggman under the name Rooms of Doom. The game is identical, however the story now involves a character named Jake (Dave) entering a haunted mansion to save his friend Mikey (Delbert). This version was released on both 3½ inch and 5¼ inch floppy disks for DOS computers. Dangerous Dave in the Haunted Mansion was ported to cell phones in 2008. This version of the game was developed in Java. References External links Page with materials about a series Dangerous Dave Article: "Reverse-engineering of Dangerous Dave In The Haunted Mansion for MSDOS". Also includes a level editor 1991 video games Id Software games DOS games Mobile games Platformers Java platform games Video games developed in the United States Softdisk
https://en.wikipedia.org/wiki/DSL%20Rings
DSL Rings (DSLR) is a telecommunications technology developed by Canadian start-up Genesis Technical Systems, based in Calgary, Canada. The DSL technology re-uses existing copper telephone network cabling to provide a stated bandwidth of up to 400 Mbit/s. The technology also includes quality of service (QoS) and efficient multicast. Genesis reported that two unnamed European telecom providers began testing the technology in July 2010. Technical overview DSL Rings technology combines the capabilities of VDSL2, DSL bonding, Resilient Packet Rings (RPR) technologies and add-drop multiplexers (ADM) in a collector ring instead of the historic tree and branch approach. The links between the houses are implemented via passive jumper wires that do not come back to the Convergence Node (CN). Thus, a single CN design can efficiently manage 216 houses in a given ring. Genesis suggests a maximum of 16 houses in the ring due to the delay introduced by transiting each node to get back to the central office (CO); however RPR has an upper limit of 255 nodes in a ring. Bonded pairs are used to obtain maximum bandwidth from the CO to the pedestal (DP). The Convergence Node, which is environmentally hardened and powered via the copper wire from the CO, terminates the bonded signals and acts as the gateway node for the subscriber 'collector' ring. DSL Rings technology is based on the Resilient Packet Rings (RPR) protocol. The technology enables a fail-safe in that, if a single pair is cut, the traffic goes in the opposite direction around the ring to get to the network gateway node. RPR also provides built in quality of service (QoS) for traffic differentiation and managed services as well as an Efficient Multicast (EM) capability that significantly reduces overall ring bandwidth requirements for multicast/broadcast video. Within the DSL Rings architecture the bonded link to the CO/Exchange, which is typically a binder group (20–25 pairs depending on the telco), is terminated at the pedestal where a ring is initiated. DSL Rings provides the capability to both terminate the bonded link from the CO and initiate another bonded link towards another pedestal down the road. References External links Genesis Technical Systems Corp. G.Bond Digital subscriber line Companies based in Calgary
https://en.wikipedia.org/wiki/Mark%20A.%20O%27Neill
Mark A. O'Neill (born 3 November 1959) is an English computational biologist with interests in artificial intelligence, systems biology, complex systems and image analysis. He is the creator and lead programmer on a number of computational projects including the Digital Automated Identification SYstem (DAISY) for automated species identification and PUPS P3, an organic computing environment for Linux. Education O'Neill was educated at The King's School, Grantham, Sheffield University and University College London. Research interests O'Neill's interests lie at the interface of biology and computing. He has worked in the areas of artificial life and biologically inspired computing. In particular, he has attempted to answer the question "can one create software agents which are capable of carrying a useful computational payload which respond to their environment with the flexibility of a living organism?" He has also investigated how computational methods may be used to analyze biological and quasi biological systems for example: ecosystems and economies. O'Neill is also interested in ethology, especially the emergent social ecosystems which occur as a result of social networking on the internet. His recent projects include the use of artificial intelligence techniques to look at complex socio-economic data. On the computer science front, O'Neill continues to develop and contribute to a number of other open source and commercial software projects and is involved in the design of cluster/parallel computer hardware via his company, Tumbling Dice Ltd. Long-running projects include DAISY; PUPS P3 an organic computing environment for Linux; Cryopid, a Linux process freezer; the [Mensor digital terrain model generation system]; and RanaVision, a vision based motion detection system. He has also worked with public domain agent based social interaction models such as Sugarscape and artificial life simulators, for example physis, which is a development of Tierra. O'Neill has been a keen naturalist since childhood. In addition to his interests in complex systems and computer science, he is a member of the Royal Entomological Society and an expert in the rearing and ecology of hawk moths. He is also currently convenor of the [Electronic and Computing Technology Special Interest Group] (SIG) for the Royal Entomological Society. He is also interested in the use of precision agriculture methodologies to monitor agri-ecosystems, and has been an active participant in a series of projects looking at the automatic tracking of bumblebees, and other insects using vision, and using both network analysis and remote sensing techniques to monitor ecosystem health. Latterly, he has become interested in applying these techniques in the commercial sphere to look at issues of corporate responsibility and sustainability in industries like mining and agriculture which have significant ecological footprints. He has also been involved in both computational neuroscience a
https://en.wikipedia.org/wiki/France%20%C3%94
France Ô () was a French free-to-air television channel featuring programming from the French overseas departments and collectivities in Metropolitan France. It was part of the France Télévisions group. It was a national counterpart of the local Outre-Mer 1ère networks. History The channel was launched in 1998 as RFO Sat by Jean-Marie Cavada, then-president of RFO, and initially broadcast for only 9 hours per day. It was re-branded as France Ô on 25 February 2005 after the reunification of RFO with France Télévisions. The "O" stands for Outre-mer (overseas); the circumflex, which is considered an accent in French grammar, was used to emphasize that the channel was open to diverse accents and dialects, as well as to ensure that the name was not read as France 0 ("France zero"). The channel became available in overseas territories in November 2010, replacing the RFO-operated Tempo, and was launched in DTT nationally the same year. Closure In July 2018 the French government announced the closure of France Ô due to declining viewership. The ceasing of broadcast was scheduled for 9 August 2020, in time for the climax of the 2020 Summer Olympics, but was later pushed to 24 August due to scheduling issues caused by the COVID-19 pandemic, which resulted in the games being initially delayed to 2021. The last programme broadcast on the channel was a repeat of the concert L'Outre-mer fait son Olympia 2019. After this, the channel only broadcast a loop of commercials promoting a new France Télévisions portal for overseas territories, known as "Portail des Outre-mer La 1ère", in addition to other overseas-themed programs on other France Télévisions channels. Its signal was permanently cut off on 2 September. See also BBC World News Bermuda Broadcasting Caribbean Broadcast Network Gibraltar Broadcasting Corporation RTV-7 TeleAruba TeleCuraçao References France Télévisions French-language television stations Television channels and stations established in 1998 1998 establishments in France Defunct television channels in France Television channels and stations disestablished in 2020 2020 disestablishments in France
https://en.wikipedia.org/wiki/NCCN
NCCN may refer to: National Competitiveness Council of Nigeria National Comprehensive Cancer Network NCCN, the molecular formula of cyanogen
https://en.wikipedia.org/wiki/Basic%20direct%20access%20method
Basic Direct Access Method, or BDAM is an access method for IBM's OS/360 and successors computer operating systems on System/360 and later mainframes. BDAM "consists of routines used in retrieving data from, and storing data onto, direct access devices." BDAM is available on OS/360, OS/VS2, MVS, z/OS, and related high-end operating systems. Description Basic, in IBM terminology, indicates a lower-level access method that deals with data sets in terms of physical blocks and does not provide either read-ahead, called anticipatory buffering, or synchronization — that is, the user program has to explicitly wait for completion of each input/output event. With BDAM, "the programmer can directly store and retrieve a block by specifying either its actual device address, its relative position within a data set (relative block number), or the relative track within a data set at which the system is to begin a search. BDAM provides no index or structure to the file except as programmed by the application. In many applications, a hashing or randomizing function may be used to assign the block address based on a key in the data. If physical keys are used, the key of the last record within the block must be written as the key for that block. The BDAM application program interface can be compared with the interface offered by open, read, write and close calls (using file handles) in other operating systems such as Unix and Windows. BDAM is still supported by IBM as of 2012. Because of its dependence on physical device geometry new IBM direct-access devices used with z/OS emulate IBM 3390 devices regardless of their real physical characteristics. Application program interface The programmer specifies DSORG=DA in his Data Control Block (DCB) to indicate use of BDAM. Space can be in up to 16 extents on each volume. The data set (equivalent to a "file") can reside in up to 255 extents across multiple volumes. If the application has a dependency on the space being on contiguous tracks, you can allocate space for the direct data set in contiguous tracks by coding SPACE=(,,CONTIG) on the DD statement. Direct data sets must be preformatted before use by opening them as output and writing all the blocks sequentially. This can load all "dummy" records or load initial data. As a basic access method BDAM reads and writes member data in blocks and the I/O operation proceeds asynchronously and must be tested for completion using the CHECK macro. BDAM uses the standard system macros OPEN, CLOSE, READ, WRITE,and CHECK. The READ or WRITE macro instructions must provide the block address or key of the desired record. The CHECK macro has to be used to wait for completion of a specific operation before the data can be accessed or the data buffer reused. It is possible to start multiple input/output operations to run concurrently. Records in a direct data set can contain user-specified recorded keys of up to 255 bytes—all keys in a file must be the same length. Reads
https://en.wikipedia.org/wiki/Zinch
Zinch was a company that helped students find scholarships and engage in college networking and recruiting. The company's website enabled students to create a profile similar to a college application, which could be browsed by colleges in which they were interested, providing a forum for a connection between college and Zinch user. Colleges also had the ability to search through these profiles in order to contact interested students. History Zinch started out as a research project at Princeton University in June 2006 by a group of students. The company was founded by Mick Hagen, Brad Hagen, and Sid Krommenhoek and launched to the public in March 2007. Cache Merrill served as CTO of Zinch for 6 years and later founded Zibtek with the core engineering team from Zinch. The company was later run by Anne Dwane, who previously founded and ran Military.com. In September 2011, Chegg agreed to acquire Zinch. as part of its expanding digital student hub. Eventually, the zinch web address began to redirect to Chegg's website, retiring the Zinch brand. References External links Official Website Studying Abroad With Scholarship Social Networking The New Face Of Recruiting University and college admissions in the United States
https://en.wikipedia.org/wiki/Oliver%20Twist%20%281982%20TV%20film%29
Oliver Twist is a 1982 American-British made-for-television film adaptation of the 1838 Charles Dickens classic of the same name, premiering on the CBS television network as part of the Hallmark Hall of Fame. Stars include George C. Scott, Tim Curry, Cherie Lunghi, and Richard Charles as Oliver, in his first major film role. Plot A young woman dies in childbirth. Witnessing the woman's birth is Mr. Bumble, a hard-nosed man in charge of the local orphans workhouse. With no information on the mother's identity, he gives the boy the name Oliver Twist. Like the other boys in the workhouse, Oliver lives a hard life of endless labour and schooling, with only a bowl of gruel for supper. After seeing his friend Dick devour his bowl and still wanting more, Oliver offers the lad his own, then goes up to Bumble and asks for more. His request angers Bumble, who hires him out to work for Mr Sowerberry, a local undertaker. Oliver's situation is not much different than the workhouse, as he is given a workbench to sleep on and scraps that Sowerberry's dogs refuse to eat for food. Oliver also becomes an object of hatred for Noah Claypole, a teenager been assigned to supervise him. Claypole taunts Oliver one day, making fun of his dead mother. The insulting remark angers Oliver, who delivers a surprisingly powerful blow to Claypole's face, breaking his nose. Sowerberry takes Claypole's side and tells Oliver he will be returned to the workhouse the following day. Unwilling to return to the workhouse, Oliver sneaks out later that evening . He roams the streets until he is met by the Artful Dodger, who offers Oliver lodgings from his benefactor. Oliver agrees, unaware of what he has got himself into. Oliver is now part of a band of thieves, overseen by Fagin, a kindly Jewish man. Among Fagin's group are Bill Sikes, a drunk who oversees the orphan thieves, and Nancy, an attractive young woman often used for sexual favors, and frequently abused by Bill. She takes a liking to Oliver and tries to help him, but for this, she is eventually viciously murdered by Bill. Oliver is made aware of his true purpose with Fagin when Sikes forces Oliver to help him burglarize a home in the countryside. The boy is shot in the process. An elderly man, Mr Brownlow, along with his niece Rose Maylie and housekeeper, Mrs. Bedwin, take pity upon him and nurse the boy back to health. They notice a close resemblance between Oliver and a lady's portrait on the wall. Monks, another criminal associate of Fagin's, has learned that he and Oliver are half-brothers and that their father has disinherited him in favor of Oliver. Brownlow is revealed to be a friend of Oliver's father, who left both the will and a portrait he had painted of Oliver's mother with Brownlow. Brownlow does some investigative work on his own to bring justice to his friend's young son. He learns of the cruelty and inhumane conditions at the workhouse, and also learns of Bumble's theft of workhouse funds for his own
https://en.wikipedia.org/wiki/Nagoya%20Expressway
The is a network of urban expressways in Japan serving the greater Nagoya area. It is owned and managed by Nagoya Expressway Public Corporation. Overview The first section of the Nagoya Expressway network opened to traffic in 1979. As of 2008, of the network has been completed. The Ring Route at the center of Nagoya is one-way, flowing clockwise. Routes 1 through 6 extend radially from the Ring Route, with Route 2 bisecting the Ring Route. Route 4 is the only route still under construction. Routes 11 and 16 are extensions of Routes 1 and 6 respectively; a separate toll is required for these routes. Nagoya Expressway faces competition from the expressways operated by Central Nippon Expressway Company in the greater Nagoya area. Discount policies on these expressways are much more significant than those on the Nagoya Expressway network, which leads to reduced revenue for the Nagoya Expressway and reduced efficiency of the entire road network in the region. Tolls Fares are denominated in yen. The first value in each field applies to passenger cars and light trucks (including 2-wheeled vehicles), while the second applies to large trucks and buses. The following applies only when using Electronic Toll Collection (ETC). *1 Special discounted fare for vehicles using only designated short sections of the expressway network. *2 Special discounted fare for travel on Sundays and national holidays (all day), and between 22:00 and 0:00 every day (20:00 - 24:00 until July 31, 2008). *3 Special discounted fare for travel between 0:00 and 6:00 every day (0:00 to 6:30 until July 31, 2008). References External links Nagoya Expressway Public Corporation
https://en.wikipedia.org/wiki/Ring%20Route%20%28Nagoya%20Expressway%29
The is an urban expressway in Nagoya, Japan. It is a part of the Nagoya Expressway network and is owned and operated by Nagoya Expressway Public Corporation. Overview The Ring Route forms a rectangular loop around downtown Nagoya. It is one-way only and flows clockwise with 2 to 4 lanes of traffic. Routes 1 through 6 of the Nagoya Expressway network extend radially from the Ring Route (Route 2 bisects it). The Ring Route also serves as the origin point for these expressways. The first section of the route was opened to traffic in 1985 and the route was completed in 1995. The future Sannō Junction will link the Ring Route to Route 4 which is under construction. In Gaming The Nagoya Expressway Ring Route is used in Wangan Midnight Maximum Tune 6 as the Nagoya Area map, or the Nagoya Speed Ring. However, when playing on this map you race for 14.9 km, going around the Ring Route more than one time but less than twice. Around the Marunouchi Exit, there are orange lights on the border of the roadway that illuminate at night, just like the actual expressway. Interchange list JCT - junction References External links Nagoya Expressway Public Corporation Ring roads in Japan Nagoya Expressway
https://en.wikipedia.org/wiki/Mobile%20fab%20lab
The mobile fab lab is a computer-controlled design and machining fab lab housed in a trailer. The first was built in August 2007 by the Center for Bits and Atoms at the Massachusetts Institute of Technology. The mobile lab includes the same computer-controlled fabrication machines found in fab labs worldwide. The MIT Center for Bits and Atoms Mobile Lab The fab lab trailer is a 2007 Pace American Shadow GT Daytona dual axle (model SCX8528TA3). It is long, wide, and high. The tailgate opens to add a deck at the back of the trailer. The main entrance is a door on the passenger side towards the front. A tall custom steel box covers most of the tongue. The lab requires a space approximately long by wide for operation as a lab. The power requirements are 240 V single phase with minimum 40 A service. To run all the equipment in the lab at once (including AC and overhead lights) is about 20 kW; to run only the 120 V equipment is about 8 kW. Two graffiti artists from the South Bronx were invited to design and paint the sides and top of the trailer in two weekends. This lab contains custom cabinetry which is an example of a lab producing a part of another lab. The cabinetry was CAD-designed and fabricated on a CNC wood router similar to the wood router in the trailer. The router in the trailer is capable of making another set of cabinets. The lab debuted in August 2007 in Chicago, Illinois during The Fourth International Fab Lab Forum and Symposium on Digital Fabrication. Its maiden road trip from Chicago to Nevada to Boston included short visits to Black Rock City, the National Renewable Energy Laboratory, the Nebraska State Fair, Gadgetoff at the Liberty Science Center. It is now loaned to organizations for months or longer, typically to help create a permanent lab in that location. These have included Sustainable South Bronx; Lorain, Ohio; Detroit, Michigan; and Washington, D.C. List of equipment The equipment included in mobile fab labs is typically a subset of the complete list of equipment for a regular fab lab, with the most common omissions being multiplications of general purpose items such as computer workstations. The original equipment list for the MIT CBA Mobile Fab Lab: 5 Dell GX620 computers and 17" LCD monitors. All computers are dual-boot Ubuntu Linux and Microsoft Windows XP. LG flat panel wide screen monitor 32" 1Gbit router, 802.11 access point, 3G cellular modem (1) Epilog 24" × 12" laser cutter (1) Roland Modela MDX-20 Mini-mill (1) Roland CAMM-1 GX-24 wide vinyl cutter (1) Shopbot PRS 48" × 96" CNC wood router with high speed spindle (1) Grizzly 4HP dust extraction system (for wood router dust removal) (1) Purex HEPA filter (for laser cutter fume removal) (1) HP OfficeJet 6210 All-In-One scanner, color inkjet printer, fax machine (1) Dustbuster vacuum cleaner (1) 1 gallon shop vac (-) hand tools such as screwdrivers, pliers, clamps, etc. (1) Function Generator, 10 MHz DDS with Counter (1) Power Supply, Triple Out
https://en.wikipedia.org/wiki/Route%201%20%28Nagoya%20Expressway%29
is an urban expressway in Nagoya, Japan. It is a part of the Nagoya Expressway network and is owned and operated by Nagoya Expressway Public Corporation. Overview The route extends northward from its junction with the Ring Route and continues until its junction with the Higashi-Meihan Expressway. It is 4 lanes for its entire length and was built as an elevated expressway above the median of National Route 41. The first section of the route was opened to traffic in 1988 and the entire route was completed in 1995. NEX Plaza, an information center run by Nagoya Expressway Public Corporation, is sandwiched in the middle of a looping ramp that makes up part of Kurokawa Interchange. Interchange list JCT - junction, TB - toll gate References External links Nagoya Expressway Public Corporation Nagoya Expressway
https://en.wikipedia.org/wiki/Route%2011%20%28Nagoya%20Expressway%29
is an urban expressway in Nagoya and Komaki, Aichi, Japan. It is a part of the Nagoya Expressway network and is owned and operated by Nagoya Expressway Public Corporation. Overview The route is a northward extension of Route 1 which terminates at its junction with the Higashi-Meihan Expressway. Route 11 continues as an elevated expressway above the median of National Route 41. The terminus is at Komaki-kita Interchange, which also provides direct access to the Meishin Expressway and Tōmei Expressway The expressway is 4 lanes for its entire length and was opened to traffic in 2001. The toll is 350 yen for passenger cars and light trucks (including 2-wheeled vehicles) and 700 yen for large trucks and buses. Electronic Toll Collection (ETC) is not accepted at the entrance of Horinouchi Interchange. However, the toll at this entrance is only 200 yen for passenger cars. The same discounted toll applies to vehicles entering or exiting the route from Toyoyama-minami Interchange at the southern end of the route, however these toll booths accept ETC. Interchange list JCT - junction, TB - toll gate References External links Nagoya Expressway Public Corporation Nagoya Expressway