source
stringlengths
32
199
text
stringlengths
26
3k
https://en.wikipedia.org/wiki/Dual-homed
Dual-homed or dual-homing can refer to either an Ethernet device that has more than one network interface, for redundancy purposes, or in firewall technology, one of the firewall architectures for implementing preventive security. An example of dual-homed devices are enthusiast computing motherboards that incorporate dual Ethernet network interface cards. Usage In Ethernet LANs, dual-homing is a network topology whereby a networked device is built with more than one network interface. Each interface or port is connected to the network, but only one connection is active at a time. The other connection is activated only if the primary connection fails. Traffic is quickly rerouted to the backup connection in the event of link failure. This feature was designed to provide telecommunications grade reliability and redundancy to Ethernet networks. Multihoming is a more general category, referring to a device having more than one network connection. In firewalls Firewall dual-homing provides the first-line defense and protection technology for keeping untrusted bodies from compromising information security by violating trusted network space. A dual-homed host (or dual-homed gateway) is a system fitted with two network interfaces (NICs) that sits between an untrusted network (like the Internet) and trusted network (such as a corporate network) to provide secure access. Dual-homed is a general term for proxies, gateways, firewalls, or any server that provides secured applications or services directly to an untrusted network. Dual-homed hosts can be seen as a special case of bastion hosts and multi-homed hosts. They fall into the category of application-based firewalls. Dual-homed hosts can act as firewalls provided that they do not forward IP datagrams unconditionally. Other firewall architectures include the network-layer firewall types screening router, screened-host, and screened subnet. See also Multihoming Firewall (computing) Router (computing) References Computer network security
https://en.wikipedia.org/wiki/The%20Linkup
The Linkup (formerly MediaMax), a spin-off from Streamload (now Nirvanix), was a "social network for file sharing" and a service that let users send, receive, and store large amounts of data via the web. It was one of the first Internet based storage services (winning numerous awards) and is now one of the largest failures resulting in user data loss. Failures On June 15, 2007 a system administrator's script accidentally misidentified and deleted "good data" along with the "dead data" of some 3.5 million former user accounts and files. It took until October 2007 to complete a partial restore of the data (much of it being irretrievably lost). The Linkup finally experienced a "meltdown" on July 10, 2008 which left about 20,000 paying subscribers without their digital music, video, and photo files from August 8, 2008. In the site's place is a message saying We're sorry, but MediaMax and The Linkup are now closed. with an affiliate link to competitor Box.net. See also Nirvanix (formerly Streamload) is the company from which The Linkup was spun off and which hosted the data Savvis is the company responsible for the application and database. References Cloud computing providers Cloud storage
https://en.wikipedia.org/wiki/HeadFirst%20PD
HeadFirst Public Domain was a library of public domain software for the BBC Micro and Acorn Electron 8-bit computers. It also offered several discs of software for the Acorn Archimedes. History It was set up in December 1992 by two friends, Gareth Boden and James Treadwell. Gareth Boden seems to have done the majority of the programming. The friends were just leaving school at the time. It was a bedroom enterprise and HeadFirst PD produced paper catalogues of its products. The catalogues invited people to buy discs full of public domain software from HeadFirst PD for £1.25 per disc. There are relatively few demos on the Acorn Electron and HeadFirst PD was unusual in that it released the majority of its software for the Acorn Electron, not the more-popular BBC Micro. Indeed, several of the better HeadFirst PD demos were Electron-only. The Invader Demo and the Vortex Demo were prime examples. There are several different 'versions' of some HeadFirst PD discs, as the demos were sometimes revisited and slightly improved. The early versions of the discs were superseded. The early HeadFirst PD catalogues, for example, typically had one demo per disc. By the latest catalogue, seven or eight demos – although not all were programmed by the two authors – were typically on a menu-driven disc. Not all games on HeadFirst PD discs were in fact programmed by HeadFirst PD. Many other public domain groups were going strong at the time, and each library 'borrowed' programs from the other. Some titles on HeadFirst PD discs also appear on BBC PD discs and Mad Rabbit PD discs. HeadFirst PD was closed down in 1995. The two friends were contributors to the Electron User Group magazine and the launch and demise of the library is documented in full between issues #7 and #23. The whole library of HeadFirst PD discs was 'lost' in 1995 when the library stopped supplying discs. In 2008, the library was re-discovered by Gareth Boden and was made available on the Acorn Electron World web site. The best known demos from HeadFirst PD remain the Invaders Demo and the Vortex Demo. Invaders shows a scrolling parallax stars backdrop with a simple space invaders game coupled with scrolling message. Vortex shows a spiral with interrupt-driven music and colour switching. HeadFirst PD also produced several games, and 'data-packs' to such popular professional titles of the day such as White Magic and Repton Infinity. In fact, their extension 'data-packs' are the only surviving fan-based extensions to these popular Electron games. HeadFirst PD also produced a spin-off library of images for use with the Stop Press 64 desktop publishing program. References Electron Public-domain software
https://en.wikipedia.org/wiki/Beno%C3%AEt%20Minisini
Benoît Minisini is a French programmer best known for programming the Gambas graphical development environment. Starting programming when he was twelve, he became interested in writing languages, compilers, assemblers, and interpreters. This interest and a respect for the BASIC programming language caused him to create Gambas, which is inspired by Visual Basic. Benoît has said that he intended Gambas to have the best features of Visual Basic, without the numerous bugs and flaws he sees in the program and the language. Benoît has a part-time software job, studied at École Pour l'Informatique et les Techniques Avancées and lives in Paris, France. See also Gambas References External links Benoît Minisini Interview Benoît Minisini Meeting at FOSDEM (Spanish) Benoît Minisini Interview (Czech) Living people French computer programmers Programming language designers Free software programmers 1973 births BASIC programming language
https://en.wikipedia.org/wiki/Everun%20Note
The Everun Note is a subnotebook / netbook computer designed by Raon Digital. At the time of its introduction, it was noted for the performance of its Turion 64 X2 dual core processor, getting high scores in benchmark testing. The Everun Note is also noted for being particularly small, given the relatively high resolution of the screen (1024x600 pixels) and taking the approach of using a touch screen instead of the touchpad that is commonly found on budget netbooks. Retailers in the U.S. are offering the Linux model pre-installed with an unspecified Ubuntu release. External links Manufacturer's Website Everun Note Information and Support Forum (Appointed by Manufacturer) References Subnotebooks Netbooks
https://en.wikipedia.org/wiki/Cyber%20Speedway
Cyber Speedway (Gran Chaser in Japan) is a 1995 racing video game developed by NexTech and published by Sega for the Sega Saturn. The game was originally called Grand Racer, but was renamed to avoid confusion with another early Saturn game, Gale Racer. It is a spiritual sequel to the 1993 computer game CyberRace; the two games share a similar theme, and vehicles designed by Syd Mead. Regional differences The game has different soundtracks depending on the region: one by Nextech's Kohji Hayama in Japan and Europe, and another by rock band Bygone Dogs in the United States. Reception Cyber Speedway received generally mediocre reviews. While critics remarked that the graphics are good and that the two-player split screen mode is a welcome treat, especially given that the Saturn's flagship racer Daytona USA is single-player only, they found fault with the gameplay, particularly the hovercraft handling. Rad Automatic of Sega Saturn Magazine argued that the vehicle's lack of traction is an inaccurate depiction of hovercraft physics, while a reviewer for Maximum felt that the hovercraft concept was a poor one to begin with, since hovercraft handle identically on all surfaces, making for "a predictable, tedious ride." A GamePro critic commented that the game was fun to play but lacked longevity, since all the tracks are easy to master and elements such as the crude cinematics in story mode limit the game's replay appeal. American magazine Next Generation reviewed the Japanese version as an import, rating it three stars out of five, and stated that "Gran Chaser is good fun, if not all together great." References External links Cyber Speedway at GameFAQs 1995 video games Science fiction racing games Multiplayer and single-player video games Nex Entertainment games Sega video games Sega Saturn games Sega Saturn-only games Split-screen multiplayer games Video games developed in Japan
https://en.wikipedia.org/wiki/CADO%20Systems
CADO Systems was a minicomputer and software manufacturer in 1976. In 1983 was acquired by Contel Business Systems. In 1989 Contel Business Systems merged with NDS and became VERSYSS. CADO was formed by former staff of McDonnell-Douglas Information Systems. CADO was based in Torrance Ca. and had a manufacturing plant and systems software engineering team in Cork, Ireland. Business model Contel and CADO focused their marketing on vertical markets. The computers and operating systems were tailored to rapid development and deployment of market-specific applications for small businesses, including: Finance (General Ledger, Accounts Receivable, Accounts Payable) Wholesale distribution (Inventory, Point of Sales, Sales Analysis) Travel (Ticketing, Passenger Management) Medical (Billing, Patient Records) CADO Systems was one of the first manufacturer of (Intel) microcomputer-based business system with disk drives, application software, a compiler for the proprietary (BASIC-like) interpreted language "CADOL". The first prototype used an 8008 and sprang to life in 1973. By 1975, CADO was selling computers. The first systems built were the 8080 "/1" systems with 3 KB of main memory and an 8-inch floppy drive. They could handle one serial port connected to one CRT-based terminal with keyboard - one user. By the late seventies, these had grown into the /4 systems with 16, 32 and later 48 KB of memory. These multitasked by using a hardware tick to XOR the base address of where the native ("CADOL" a basic like-) interpreter took instructions from. These also used 8085 processors. The memory switching trick was done with proprietary hardware. The "/4" system had four serial ports, therefore four terminals, therefore four users. They could also be connected to modems instead and spoke various protocols such as X.25. The /8 was two /4s sharing a common (hard) disk drive. It was effectively an eight-user system built out of two 8085s. Around the time of the /8, development the CADO CAT computer came into being. It looked like a fruit-coloured iMac, but it was 20 years earlier. It had an integrated CRT and disk drives, which by that time (1981) had been shrunk to 5 inches wide and could fit inside the CRT enclosure. Earlier CADO computers used external hard drives, all of which were quite large. The CAT product line consisted of: CAT I CAT II CAT III The CAT III was a three-user system. The primary user sat at the CAT III system console, which contained the CPU, floppy drive, and hard disk. Other users connected to the system by way of serial terminals. By the end of the CAT series, over 25,000 systems and 200,000 terminals were manufactured. The terminals were proprietary also: they were similar to standard VT terminals, but with custom firmware programming to support input commands (protected fields). All CADO systems up to that point had the system and CADOL interpreter reside in EPROM, so as soon as power was applied it read track 0 secto
https://en.wikipedia.org/wiki/Prisoner%20of%20Zenda%2C%20Inc.
The Prisoner of Zenda, Inc is a 1996 television film starring Jonathan Jackson and William Shatner. It was produced for Showtime Networks under their family division, and first aired in September 1996. The film was written by Rodman Gregg and Richard Clark. Inspired by the classic 1937 MGM version of Anthony Hope's 1894 novel The Prisoner of Zenda and starring Ronald Colman, The Prisoner of Zenda, Inc. was a contemporary version loosely based on the original. Zenda was the castle in the mythical kingdom of Ruritania in previous versions, whereas Zenda Inc. is a computer business empire in this version. The film continued the theme of mistaken identities which was central to the plot. Jackson plays Oliver and his lookalike Rudy (who is named after Prince Rudolf from the original, and in this case is a Star Trek fan—a nod to co-star Shatner). The film also starred American character actor Don S. Davis from the popular television series Stargate SG-1. It was released on VHS under the renamed title Double Play, but reverted to the original title for the DVD release. References External links 1996 films 1996 television films 1990s adventure drama films Films based on The Prisoner of Zenda Films shot in British Columbia Showtime (TV network) films 1996 drama films American drama television films 1990s English-language films 1990s American films Films set in Europe
https://en.wikipedia.org/wiki/Code%20golf
Code golf is a type of recreational computer programming competition in which participants strive to achieve the shortest possible source code that solves a certain problem. Code golf challenges and tournaments may also be named with the programming language used (for example, Perl golf). Etymology The term "code golf" is derived from the similarity of its goal with that of conventional golf, where participants seek to achieve the lowest possible score, rather than the highest, as is the standard in most sports and game scoring systems. While conventional golf players try to minimize the number of club strokes needed to complete the course, code golfers strive to reduce the number of characters necessary to write the program. History The length of the shortest possible program that produces a given output (in any fixed programming language) is known as the Kolmogorov complexity of the output, and its mathematical study dates to the work of Andrey Kolmogorov in 1963. Code golf, however, can be more general than this, as it often specifies a general input-output transformation that must be performed rather than asking for a single output with no input. Whilst the term "code golf" was apparently first used in 1999 with Perl, and later popularised through the use of Perl to write a program that performed RSA encryption, a similar informal competition is known to have been popular with earlier APL hackers. The challenging nature of aggressively optimizing for program size has itself long been recognized; for example, a 1962 coding manual for Regnecentralen's GIER computer notes that "it is a time-consuming sport to code with the least possible number of instructions" and recommends against it for practical programming. Today the term has grown to cover a wide variety of languages, which has even triggered the creation of dedicated golfing languages. Dedicated golfing languages Several new languages have been created specifically with code golfing in mind. Examples include GolfScript, Flogscript and Vyxal, which are Turing-complete languages which provide constructs for concisely expressing ideas in code. Because golfing languages compete for extreme brevity, their design sacrifices readability, which is important for practical production environments, and therefore they are often esoteric. Sometimes, however, a language is designed for a practical purpose, but turns out to be suitable for code golf. An example of GolfScript code to print 1000 digits of pi: ;'' 6666,-2%{2+.2/@*\/10.3??2*+}* `1000<~\; This prints a string starting with "3141592653" followed by 990 more digits of pi. Code golf websites include novel golfing languages created by users to win code golf challenges. Other popular languages include 05AB1E, Husk, Pyth, CJam and Jelly. Types of code golf Some code golf questions, such as those posed on general programming sites, may not require implementation in a specific programming language. However, this limits the style of prob
https://en.wikipedia.org/wiki/Mathematical%20programming%20with%20equilibrium%20constraints
Mathematical programming with equilibrium constraints (MPEC) is the study of constrained optimization problems where the constraints include variational inequalities or complementarities. MPEC is related to the Stackelberg game. MPEC is used in the study of engineering design, economic equilibrium, and multilevel games. MPEC is difficult to deal with because its feasible region is not necessarily convex or even connected. References Z.-Q. Luo, J.-S. Pang and D. Ralph: Mathematical Programs with Equilibrium Constraints. Cambridge University Press, 1996, . B. Baumrucker, J. Renfro, L. T. Biegler, MPEC problem formulations and solution strategies with chemical engineering applications, Computers & Chemical Engineering, 32 (12) (2008) 2903-2913. A. U. Raghunathan, M. S. Diaz, L. T. Biegler, An MPEC formulation for dynamic optimization of distillation operations, Computers & Chemical Engineering, 28 (10) (2004) 2037-2052. External links MPEC examples such as SIGN, ABS, MIN, and MAX Formulating logical statements as continuously differentiable nonlinear programming problems Mathematical optimization
https://en.wikipedia.org/wiki/MPEC
MPEC may refer to: Mathematical programming with equilibrium constraints Minor Planet Electronic Circular Multi-Purpose Experiment Canister (MPEC (US satellite)), a classified aditya launched by Space Shuttle mission STS-39 in April 1991 multi-purpose event center, or more particularly the Wichita Falls Multi-Purpose Event Center
https://en.wikipedia.org/wiki/Actinopeltis%20%28trilobite%29
Actinopeltis is an extinct genus of trilobite. It contains one species, A. spjeldnaesi. External links Actinopeltis at the Paleobiology Database Cheiruridae Phacopida genera Ordovician trilobites of Europe Sandbian Fossils of the Czech Republic Letná Formation
https://en.wikipedia.org/wiki/Kir%C3%A8ne
Kirène is a small town in western Senegal about 70 km from the capital, Dakar. Transport It lies about 20 km from the nearest railway station, Thiès, on the railway network of Senegal. Industry The town has a cement works, which is being expanded in 2008. You can also find a company called SIAGRO (Société Industrielle Agroalimentaire) that produces bottled water "Kirène" nectar juice "Préssèa" simple milk "Candia" and flavored milk "Candy Up" . The SIAGRO employs approximately 200 employees and 75% from the surrounding villages (Kirène, Diass, Sindia, .....) See also Cement in Africa References Populated places in Senegal
https://en.wikipedia.org/wiki/Game%20backup%20device
A game backup device, informally called a copier, is a device for backing up ROM data from a video game cartridge to a computer file called a ROM image and playing them back on the official hardware. Recently flash cartridges, especially on the Game Boy Advance and Nintendo DS platforms, only support the latter function; they cannot be used for backing up ROM data. Game backup devices also make it possible to develop homebrew software on video game systems. Game backup devices differ from modchips in that modchips are used in conjunction with systems that use generally available media such as CDs and DVDs, whereas game backup devices are used with systems that use cartridges. Video game companies consider these devices as a tool for reverse engineering to facilitate copyright infringement. Most of the devices are made in China, but they are available globally. Recently, legal action has been taken by companies such as Nintendo to remove these devices from the marketplace, but the easy dissemination of information and selling of products over the Internet has made it difficult to eradicate this problem. Hobbyists argue that these devices are legal and shouldn't be illegal because they fulfill the need to back up games in case the original is illegally sold or lost; and because they permit the private development of new software on the device. In Japan, these devices are known as , an umbrella term for any device that enables backups on game consoles. History The spiritual forefather of copier devices can be traced back to the Famicom Disk System, an official add-on device for the Japanese version of the Nintendo Entertainment System. Users quickly discovered ways to copy these disks with ordinary home computers of the time and transmit the copied data to others using the emerging electronic bulletin board systems. Nintendo attempted to counter the piracy problem by slightly modifying the hardware in newer revisions, but they were unable to stop the unauthorized copying. Later, the Famicom Disk System was discontinued, supposedly because cartridge technology had caught up in capacity, but the influence of rampant piracy cannot be discounted. When the Super Nintendo Entertainment System was released, Hong Kong based companies were quick to cash in on the same idea. They produced cartridges that fit in the video game console's cartridge slot, but were interfaced with a floppy disk drive through a connecting cable. The copier, as they were called, also had a passthrough slot into which a real game could be inserted. The device, once powered up, could be used to copy the cartridge's ROM data into files on ordinary MS-DOS formatted 3.5" floppy disks and thereafter to play the game from the same disks, without having to rely on the original cartridge being present. When these devices were introduced to the United States and Europe, video game enthusiasts quickly started swapping the copied games over bulletin board systems. Release groups formed t
https://en.wikipedia.org/wiki/Australasian%20Underwater%20Cultural%20Heritage%20Database
The Australasian Underwater Cultural Heritage Database (AUCHD) is an online, searchable database containing data on shipwrecks, aircraft that have been submerged underwater or wrecked on the shore, and other artefacts of cultural significance which are or have been underwater. It includes what used to be called the Australian National Shipwreck Database (ANSDB), originally developed by the Australasian Institute of Maritime Archaeology in December 2009, now significantly expanded to include other objects. The database was hosted and maintained by the Department of the Environment and Energy until the environment functions of that department, including AUCHD, were taken over by the Department of Agriculture, Water and the Environment on 1 February 2020. It comprises historical and environmental information about objects currently or previously located underwater in the Oceania and Southeast Asian regions. It includes images, the ability to link shipwrecks to artefacts recovered from their sites, site information for divers and site managers, data about passengers and crew, as well as details about the technical specifications and history of the ships. All data is also searchable by people, places and themes. Approved researchers may be recruited from the public and provided with access to edit or create records. The AUCHD also serves as the register of protected underwater cultural heritage for the Underwater Cultural Heritage Act 2018 (the UCH Act), which provides a means whereby the public can submit notifications and permit applications required under the UCH Act. Shipwrecks, sunken aircraft and other types of underwater heritage and their associated artefacts are protected through the Act, which is administered in collaboration between the Commonwealth and the States, Northern Territory and Norfolk Island. The database is included in the Department's "Heritage places and lists" along with other heritage databases which form part of the Australian Heritage Database, but the database and its search facility are separate. See also Historic Shipwrecks Act 1976 References Further reading External links Historic preservation in Australia Online databases Ship databases Databases in Australia Heritage registers in Australia Australasia
https://en.wikipedia.org/wiki/Richard%20Duffin
Richard James Duffin (1909 – October 29, 1996) was an American physicist, known for his contributions to electrical transmission theory and to the development of geometric programming and other areas within operations research. Education and career Duffin obtained a BSc in physics at the University of Illinois, where he was elected to Sigma Xi in 1932. He stayed at Illinois for his PhD, which was advised by Harold Mott-Smith and David Bourgin, producing a thesis entitled Galvanomagnetic and Thermomagnetic Phenomena (1935). Duffin lectured at Purdue University and Illinois before joining the Carnegie Institute in Washington, D.C. during World War II. His wartime work was devoted to the development of navigational equipment and mine detectors. In 1946, he became professor of mathematics at Carnegie Mellon University. He wrote a letter of recommendation to Princeton University for John Forbes Nash, Jr., later a Nobel laureate. In 1949, Duffin and his student Raoul Bott developed a generalized method of synthesising networks without transformers which were required in earlier methods. In 1967 Duffin joined with Clarence Zener and Elmor Peterson to write Geometric Programming which developed a branch of mathematical programming by introducing a generalization of polynomials to posynomials for engineering applications. Impressed with its innovations, a reviewer wrote, "common sense, ingenuity and originality in applying first principles are still competitive with other creative forms of the intellect." The methods of geometric programming are sometimes adapted for convex optimization. Duffin would remain at Carnegie Mellon until his retirement in 1988. Duffin was also a consultant to Westinghouse Electric Corporation. Duffin was inducted to the National Academy of Sciences in 1972 and to the American Academy of Arts and Sciences in 1984. He was joint winner of the 1982 John von Neumann Theory Prize, and winner of Sigma Xi's Monie A. Ferst Award for 1984 in recognition of his ability as a teacher and communicator. He was elected to the 2002 class of Fellows of the Institute for Operations Research and the Management Sciences. Selected publications 1949: (with Raoul Bott) "Impedance synthesis without the use of transformers", Journal of Applied Physics 20:816. 1952: (with A. C. Schaeffer) 1953: (with R. Bott) 1956: 1959: 1962: 1967: (with Elmor Peterson and Clarence M. Zener) Geometric Programming, John Wiley & Sons 1974: See also Frame (linear algebra) Parallel addition Signomial Wang algebra References 1909 births 1996 deaths Scientists from Chicago 20th-century American physicists Grainger College of Engineering alumni Purdue University faculty Carnegie Mellon University faculty Fellows of the Institute for Operations Research and the Management Sciences Members of the United States National Academy of Sciences John von Neumann Theory Prize winners
https://en.wikipedia.org/wiki/Comparison%20of%20UPnP%20AV%20media%20servers
The following table compares the operating system support and basic features of various UPnP AV media servers. See also List of UPnP AV media servers and clients Comparison of set-top boxes Universal Plug and Play Digital Living Network Alliance Notes References UPnP AV MediaServers Digital media Media servers
https://en.wikipedia.org/wiki/GrADS
The Grid Analysis and Display System (GrADS) is an interactive desktop tool that is used for easy access, manipulation, and visualization of earth science data. The format of the data may be either binary, GRIB, NetCDF, or HDF-SDS (Scientific Data Sets). GrADS has been implemented worldwide on a variety of commonly used operating systems and is freely distributed over the Internet. GrADS uses a 4-Dimensional data environment: longitude, latitude, vertical level, and time. Data sets are placed within the 4-D space by use of a data descriptor file. GrADS interprets station data as well as gridded data, and the grids may be regular, non-linearly spaced, Gaussian, or of variable resolution. Data from different data sets may be graphically overlaid, with correct spatial and time registration. It uses the ctl mechanism to join differing time group data sets. Operations are executed interactively by entering FORTRAN-like expressions at the command line. A rich set of built-in functions are provided, but users may also add their own functions as external routines written in any programming language. Data may be displayed using a variety of graphical techniques: line and bar graphs, scatter plots, smoothed contours, shaded contours, streamlines, wind vectors, grid boxes, shaded grid boxes, and station model plots. Graphics may be output in PostScript or image formats. GrADS provides geophysically intuitive defaults, but the user has the option to control all aspects of graphics output. GrADS has a programmable interface (scripting language) that allows for sophisticated analysis and display applications. Scripts can display buttons and drop menus as well as graphics, and then take action based on user point-and-clicks. GrADS can be run in batch mode, and the scripting language facilitates using GrADS to do long overnight batch jobs. As of version 2.2.0, graphics display and printing are now handled as independent plug-ins. A C-language Python extension for GrADS called GradsPy was introduced in version 2.2.1. See also Climate Data Analysis Tool Giovanni (meteorology) IDL (programming language) and GNU Data Language MATLAB and GNU Octave NCAR Command Language References External links GrADS official site OpenGrADS official site HiGrads - A GrADS script function library for managing subplots and charts Earth sciences graphics software Free science software Graphic software in meteorology Meteorological data and networks
https://en.wikipedia.org/wiki/M%C9%99d%C9%99dk%C9%99nd
Madadkend () or Madatashen () is a village in the Khojaly District of Azerbaijan, in the disputed region of Nagorno-Karabakh. The village had an ethnic Armenian-majority population prior to the 2020 Nagorno-Karabakh war, and also had an Armenian majority in 1989. History During the Soviet period, the village was part of the Askeran District of the Nagorno-Karabakh Autonomous Oblast. After the First Nagorno-Karabakh War, the village was administrated as part of the Askeran Province of the breakaway Republic of Artsakh. The village was captured by Azerbaijan during the 2020 Nagorno-Karabakh war. Subsequently, videos emerged online showing Azerbaijani forces committing a war crime by decapitating 69-year old Armenian Genadi Petrosyan. Historical heritage sites Historical heritage sites in and around the village include a 17th-century bridge, a 17th-century spring monument, an 18th/19th-century cemetery, a 19th-century watermill, and the 19th-century church of Surb Astvatsatsin (, ). Demographics The village had 94 inhabitants in 2005, and 104 inhabitants in 2015. References External links Populated places in Khojaly District Populated places in Askeran Province
https://en.wikipedia.org/wiki/Crank%20Caverns
Crank Caverns is the common name of the remains of the Rainford Delph Quarry near Crank in St. Helens, Merseyside, England. It is a vast network of old tunnels and caverns, with very little known about the owners or workers of the tunnels. It appears that the main portals are much newer than the deeper tunnels found behind the tight squeeze through the gated entrance. Information in the St. Helens local history archives states that sandstone quarrying began here as early as 1700. The 1840s Ordnance Survey refers to the quarry as Rainford Old Delph. The woodland surrounding the caverns were used as a game reserve by the Earl of Derby until 1939, when they became a storage facility for ammunition for the anti-aircraft position at Crank. After the war, the caverns ceased use as a game reserve. Today, Crank Caverns are still physically accessible from a nearby public footpath, and despite the fly-tipping of rubble, shredded plastic and animal waste from the nearby Rainford Delph Farm. It is still a draw for generations of curious locals who wish to explore, many having heard the numerous local myths and legends from an early age. Caverns The mines are an example of pillar and stall mining, with the roof having support provided by pillars of stone left in place when mining was taking place. There are two sets of caverns, the first and most noticeable caves have seven portals and lead down into a large cavern. To the back and to the left of this was a roadway which was sealed in 1948. Beyond the roadway is an extensive network of tunnels, with access being possible through what is now a filled in entrance in a small patch of woodland just behind Crossdale Way, Moss Bank. The Stork Inn in the nearby town of Billinge may have access to this vast network through their cellar. The other set of caves lies north west of the first set. These caves lie at the bottom of a deep ditch. The largest is a short cavern called the "Elephant Cave". This has a ledge which is difficult to climb without ropes but is said to go deeper into the main roadway. The Mousey is a smaller gated cavern next to the Elephant cave which leads into a much deeper and older set of tunnels. The entrance to the deeper set of tunnels is called "The Mousey" , due to it being an extremely tight crawl. It is gated with "Hell" written on the top and requires you to crawl on your belly through for appropriately 2-3 minutes before it opens up. The tunnels that are in the deepest section of this entrance are much older and feature long and vast stalactites and stalagmites compared to the Pillar and Stall method seen in the newer caverns. There is a stone-lined shaft that has been filled in many times by the farmer. The infill from this shaft blocks access to further tunnels in the Mousey area. The shaft infill can be seen where the newer Pillar and Stall technique splits off to the older tunnels. Many people have tried to dig through here but none have succeeded, the mixture stone, mud and clay h
https://en.wikipedia.org/wiki/Serge%20Abiteboul
Serge Joseph Abiteboul (born 25 August 1953 in Paris, France) is a French computer scientist working in the areas of data management, database theory, and finite model theory. Education The son of two hardware store owners, Abiteboul attended high-school in Romorantin, and Higher School Preparatory Classes in Tours. He was admitted to the Télécom Paris engineering school and studied at the Technion in Haifa for a year. Abiteboul received his PhD from the University of Southern California under the supervision of Seymour Ginsburg, in 1982. Career and research Abiteboul is a senior researcher at the Institut national de recherche en informatique et en automatique (INRIA), the French national research institute focussing on computer science and related areas, and has been a professor of the Collège de France. He is known for his many contributions in the areas of finite model theory, database theory, and database systems. In finite model theory, the Abiteboul–Vianu Theorem states that polynomial time is equal to PSPACE if and only if fixed point logic is the same as partial fixed point logic. In database theory, he has contributed a wide variety of results, the most recent on languages for the distributed processing of XML data. In data management, he is best known for his early work on semistructured and Web databases. In 2008, according to Citeseer, he is the most highly cited researcher in the data management area who works at a European institution. Abiteboul is also known for two books, one on database theory and one on Web data management. He frequently writes for French newspapers, including Le Monde, Libération and La Tribune A member of the ARCEP, the independent agency in charge of regulating telecommunications in France, Abiteboul has been an advocate of net neutrality. He has also been critical of virtual assistants and their impact on privacy. In 2019, he is among the members of a group tasked by the French government with addressing online bullying and harassment. Awards and honours Abiteboul was awarded the Association for Computing Machinery (ACM) SIGMOD Test of Time Award in 2004, the Prix EADS in 2007 and the ACM PODS Alberto O. Mendelzon Test-of-Time Award (2008). Abiteboul was elected a member of the French Academy of Sciences in 2008, of the European Academy of Sciences in 2011, and an ACM Fellow in 2011. References Database researchers Members of the French Academy of Sciences Fellows of the Association for Computing Machinery Living people 1953 births French computer scientists University of Southern California alumni
https://en.wikipedia.org/wiki/Peter%20Buneman
Oscar Peter Buneman, (born 1943) is a British computer scientist who works in the areas of database systems and database theory. Education Buneman was educated at the University of Cambridge, where he was awarded a Bachelor of Arts while studying the Cambridge Mathematical Tripos from Gonville and Caius College, Cambridge. Buneman went on to study at the University of Warwick, where he received his PhD in 1970. Career Following his PhD, Buneman worked briefly at the University of Edinburgh, followed by a professorship of computer science at the University of Pennsylvania, which he held for several decades. In 2002, he moved to the University of Edinburgh, where he built up the database research group. He is one of the founders and the Associate Director of Research of the UK Digital Curation Centre, which is located in Edinburgh. Buneman is known for his research in database systems and database theory, in particular for establishing connections between databases and programming language theory, such as introducing monad-based query languages for nested relations and complex object databases. He also pioneered research on managing semi-structured data, and, recently, research on data provenance, annotations, and digital curation. In computational biology, he is known for his work on reconstructing phylogenetic trees based on Buneman graphs, which are named in his honour. Awards and honours Buneman is a Fellow of the Royal Society, fellow of the ACM, a fellow of the Royal Society of Edinburgh, and has won a Royal Society Wolfson Research Merit Award. He has chaired both flagship research conferences in data management, SIGMOD (in 1993) and VLDB (in 2008), as well as the main database theory conference, PODS (in 2001). Buneman was appointed Member of the Order of the British Empire (MBE) in the 2013 New Year Honours for services to data systems and computing. His nomination for the Royal Society reads Personal life Buneman is the son of physicist Oscar Buneman. References Fellows of the Association for Computing Machinery Database researchers British computer scientists Fellows of the Royal Society Fellows of the Royal Society of Edinburgh Academics of the University of Edinburgh Alumni of the University of Warwick Members of the Order of the British Empire Royal Society Wolfson Research Merit Award holders University of Pennsylvania faculty Living people 1943 births
https://en.wikipedia.org/wiki/Kristiania%20Elektriske%20Sporvei
A/S Kristiania Elektriske Sporvei or KES, nicknamed the Blue Tramway (), was a company which operated part of the Oslo Tramway between 1894 and 1924. It built a network of four lines in Western Oslo, the Briskeby Line and the Frogner Line which ran to Majorstuen, and two other consecutive lines, the Skøyen Line and the Lilleaker Line. These all connected to a common line through the city center which terminated at Jernbanetorget. KES was established as the second tram operator in Oslo (then known as Kristiania). When it commenced services it was the first electric tramway in Scandinavia. It originally opened the Briskeby Line and the Skøyen Line to Skillebekk using a fleet of Class A trams. Later the company also ordered Class U and Class SS trams, for a total 78 motor cars and 66 trailers. Skøyen was reached in 1903. The first part of the Frogner Line opened in 1902, and it was completed in 1914. The Lilleaker Line was built to Lilleaker in 1919. KES and its competitor, Kristiania Sporveisselskab (KSS) were both taken over by Oslo Municipality in May 1924 and became Oslo Sporveier. The take-over did not include the Lilleaker Line and this part of the operation continued as Bærumsbanen. History Establishment The Oslo Tramway was established as a horsecar network in 1875 by Kristiania Sporveisselskab. In 1887 it rejected a proposal for L. Samson, a real estate developer, to build a line to Majorstuen to serve his projects. He therefore contacted engineers H. E. Heyerdal and A. Fenger-Krog, the latter who had studied tramways abroad. They sent an application that year to the municipality, at a time when there were no other electric tramways in operation in Europe. However, the application did not explicitly state that the company would use electric traction. KSS retained it priority in laying new lines. The group received permission for two lines, one from Jernbanetorget, the square outside Oslo East Station, to Majorstuen. It would receive a branch from Inkognitogaten and Drammensveien to Skøyen, a total distance of . User of overhead wires had been discouraged by the city engineer, but he later changed his mind after a trip to Germany. The issue was decided upon by the municipal council on 19 May 1892. The concession had a duration of thirty years, of which the municipality retained the right to municipalize the company after fifteen years and at the end of the duration. Shares worth 800,000 Norwegian krone (NOK) issued in October 1892, which sold out in a month. A/S Kristiania Elektriske Sporvei was incorporated on 16 December 1892. Heyerdal was appointed chair of the board, a position he held until his death in 1917. Fenger-Krog was hired as managing director. Six companies bid to deliver trams and electrical equipment; Allgemeine Elektrizitäts Gesellschaft (AEG) won and delivered seven Class A motor trams and five trailers. In June 1893 the contract to lay the tracks was issued to H. W. Wessel. The company applied the municipality to buy
https://en.wikipedia.org/wiki/Georg%20Gottlob
Georg Gottlob FRS is an Austrian-Italian computer scientist who works in the areas of database theory, logic, and artificial intelligence and is Professor of Informatics at the University of Calabria. He was Professor at the University of Oxford. Education Gottlob obtained his undergraduate and PhD degrees in computer science at Vienna University of Technology in 1981. Career and research Gottlob is currently a chaired professor at the University of Calabria in Italy where he joined in 2023 due to the "Fantastic Équipe and great potential" that he belivies there is in this University. He was a professor of computing science at the Oxford University Department of Computer Science, where he helped establish the information systems research group. He is also a Fellow of St John's College, Oxford. Previously, he was a professor of computer science at Vienna University of Technology, where he still maintains an adjunct position. He was elected a member of the Royal Society in May 2010. He is a founding member of the Oxford-Man Institute. He has published more than 250 scientific articles in the areas of computational logic, database theory, and artificial intelligence, and one textbook on logic programming and databases. In the area of artificial intelligence, he is best known for his influential early work on the complexity of nonmonotonic logics and on (generalised) hypertree decompositions, a framework for obtaining tractable structural classes of constraint satisfaction problems, and a generalisation of the notion of tree decomposition from graph theory. This work has also had substantial impact in database theory, since it is known that the problem of evaluating conjunctive queries on relational databases is equivalent to the constraint satisfaction problem. His recent work on XML query languages (notably XPath) has helped create the complexity-theoretical foundations of this area. Awards and honours Gottlob has received numerous awards and honours including election to the Royal Society in 2010. His nomination for the Royal Society reads: Gottlob has also been designated as an ECCAI fellow in 2002, and received honorary doctorates from the University of Klagenfurt (2016) and the University of Vienna (2020). References Austrian computer scientists Fellows of the Association for Computing Machinery Fellows of the Royal Society Database researchers Living people Royal Society Wolfson Research Merit Award holders Members of the Department of Computer Science, University of Oxford Members of Academia Europaea 1956 births Scientists from Vienna TU Wien alumni Fellows of St Anne's College, Oxford Fellows of St John's College, Oxford Academic staff of TU Wien
https://en.wikipedia.org/wiki/Dan%20Suciu
Dan Suciu is a full professor of computer science at the University of Washington. He received his Ph.D. from the University of Pennsylvania in 1995 under the supervision of Val Tannen. After graduation, he was a principal member of the technical staff at AT&T Labs until he joined the University of Washington in 2000. Suciu does research in data management, with an emphasis on Web data management and managing uncertain data. He is a co-author of an influential book on managing semistructured data. His research work on developing query languages and algorithms for managing semistructured and XML data has been highly influential in the data management research community. He has helped shape XML query languages such as XML-QL and Strudel, which influenced the subsequent design of the standard XQuery language. His work on XML-relational mapping in the context of the STORED and SilkRoute projects built the foundations of the standard techniques that are now used for storing XML data in commercial database systems. His work on XMill, an XML compressor, won the best paper award at SIGMOD 2000, the main research conference in data management, and was seminal to a substantial amount of follow-up work. At the 2010 Symposium on Principles of Database Systems, Suciu and his co-authors Victor Vianu and Tova Milo won the Alberto O. Mendelzon Test-of-Time Award for their work ten years prior on type checking for XML transformation languages. In 2011, he was inducted as a Fellow of the Association for Computing Machinery. His current work on probabilistic databases was at the outset of a revival of interest in this area. He lives in Seattle, Washington, with his wife and two children. Footnotes References Dan Suciu's homepage: http://www.cs.washington.edu/homes/suciu/ Database researchers Romanian computer scientists Fellows of the Association for Computing Machinery Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/USNS%20Range%20Recoverer
USNS Range Recoverer (T-AG-161/T-AGM-2/YFRT-524) was a missile range instrumentation ship responsible for providing radar and/or telemetry track data on missiles launched from American launch sites. She was built during World War II as U.S. Army U.S. Army FS-278, and was acquired by the U.S. Navy in 1960 as miscellaneous auxiliary and was converted into a missile tracking ship. She continued her missile tracking until being placed out of service in 1972, at which time she was reclassified range tender YFRT-524, and eventually sold for scrap in 1974. However, she avoided the scrapyards and served as a fishing vessel until at least 2016. U.S. Army FS-278 was built for the Army in 1944, by the Wheeler Shipbuilding Corp., Whitestone, New York. FS-278 was a Coast Guard-crewed Army vessel commissioned at New York on 25 November 1944 departing New York on 17 December 1944, for the Southwest Pacific where she operated at Peleliu, Palawan, etc. during the war. Command transferred to LT A. W. Engle, USCGR on 25 June 1945. From 28 August until 20 September FS-278 transported General Douglas MacArthur's defense planning staff for the Philippine Islands. She was decommissioned 3 October 1945. U.S. Navy The ship was acquired by the Navy in April 1960; converted by Pacific Ship Repair, San Francisco, California; and placed in service with the Military Sea Transportation Service (MSTS) as T-AG-161 on 22 June 1960. Missile tracking activities Named Range Recoverer on 12 July, she reported to the Navy's Pacific Missile Range in August 1960. At the time Navy had command and control authority over nearly all Vandenberg Air Force Base launches and the range. On 27 November she was reclassified a missile range instrumentation ship and designated T-AGM-2. She is equipped with telemetry, data processing and radio instruments as well as recovery facilities to retrieve nose cones. Manned by a Civil Service crew of the Military Sea Transportation Service, Range Recoverer served first as a telemetry and recovery ship on the Pacific Missile Range where she launched, tested, and evaluated the Regulus missile. In July 1962 Range Recoverer shifted to Little Creek, Virginia, to support the NASA facility at Wallops Island, Virginia. NASA technical party operators used on board equipment, including helix antennas, data recording systems and a communications suite with direction finders to locate and recover payloads. There she replaced two T-1 tankers, Dumont and Whitlock, damaged during a storm. Since that time, into 1970, Range Recoverer operated out of Little Creek primarily between Wallops Island and the splash down area near Bermuda. Other services provided During the mid-sixties the ship traveled to Greece for coordinated research on a solar eclipse and was visited by the Greek royal family. NASA, assisting other government agencies, has also loaned Range Recoverer to the Virginia Institute of Marine Science and the Woods Hole Oceanographic Institute, to conduct ocea
https://en.wikipedia.org/wiki/2E
2E or II-E may refer to: 2nd meridian east, a longitude coordinate Apple IIe, a 1983 model in the Apple II series of personal computers Aptera 2e, the 2009 and first model in the Aptera 2 Series by Aptera Motors Oflag II-E, a prisoner of war camp in Germany 2nd arrondissement of Paris Transcription Factor II E Twice exceptional, an individual with special needs who is also gifted. A reference to data collected by the Einstein Observatory (version 2) YoRHa No. 2 Type E, the actual designation of YoRHa No. 2 Type B in Nier: Automata Advanced Dungeons & Dragons 2nd Edition, a version of the Dungeons & Dragons role-playing game that debuted in 1989. Pathfinder Second Edition, a version of the Pathfinder role playing game that debuted in 2019. See also E2 (disambiguation) IIE (disambiguation)
https://en.wikipedia.org/wiki/RBS%20TV
RBS TV is a Southern Brazilian television network owned by Grupo RBS, and one of the oldest Rede Globo affiliates. The acronym originally stood for Rede Brasil Sul de Televisão (English: "Brazil South Television Network"), but currently the network never uses its full name on-air. RBS TV owns 12 television stations in Rio Grande do Sul. RBS TV Porto Alegre is the headquarters for the network. RBS TV stations produce an average amount of local and regional programming, composed mainly of news, but also drama series, documentaries, sports, variety and youth programming. History TV Gaúcha was created in 1962 in Porto Alegre, Rio Grande do Sul, and would later become RBS TV Porto Alegre. The following year, TV Gaúcha affiliated itself with Rede Excelsior. Rede Globo was launched in Rio de Janeiro two years later, but TV Gaúcha would only become its affiliate in 1967. In 1979, it started to operate in Florianópolis, the capital city of Santa Catarina. This new purchase obliged the network to change its name to something less Rio Grande do Sul-related (as the word "Gaúcha" was), and it was rebranded RBS TV that same year. Broadcasters members Rio Grande do Sul Santa Catarina (formerly) RBS TV Florianópolis (Florianópolis) - 12 RBS TV Blumenau (Blumenau) - 3 RBS TV Centro-Oeste (Joaçaba) - 6 RBS TV Chapecó (Chapecó) - 11 RBS TV Criciúma (Criciúma) - 9 RBS TV Joinville (Joinville) - 5 Corporate slogans (translated to English) 1962-1963 Rio Grande's living image. 1987-1992: A station serving the community. 1996-2000: All for You. 2000-2003: We show, you see. 2003-2008: Your Life on TV. 2008-2012: We do it for you. 2012-2015: We do it with you. 2015-2019: The TV connects us. 2019–present: Well for you. Inquiry on RBS Group oligopoly / monopoly practicing The RBS Group is being investigated by the practice of oligopoly / monopoly. In 2008, the Federal Prosecutor of Santa Catarina has filed a public civil action (Case No.. 2008.72.00.014043-5) against the company oligopoly Rede Brasil Sul (RBS) in southern Brazil. The MPF requires the company, among other measures, to reducing its number of TV and radion stations in the states of Santa Catarina (SC) and Rio Grande do Sul (RS), so that to be in according to the Brazilian law; and the cancellation of the purchase of the newspaper A Notícia from Joinville, consummated in 2006 - which resulted in a virtual monopoly over the relevant newspapers in the state of Santa Catarina. In 2009, the Federal Prosecutor in Canoas (RS), Pedro Antonio Roso, asked the chairman of the RBS Group, Nelson Pacheco Sirotsky, among other informations, the number of TV and radio stations that the company owns in Rio Grande do Sul, "as well as its affiliates, stations and repeaters." The request is part of an administrative proceeding brought by federal prosecutors "to determine possible occurrence of monopolistic practices and irregularities in granting Radio and Television to the RBS Group in Rio Grande do Sul". Notes
https://en.wikipedia.org/wiki/Conticinio
"Conticinio" is a well-known Venezuelan song, that was composed in 1922 by Laudelino Mejías, like anecdotal data, Mejías explained that his composition was made when he remembered Trujillo city in Venezuela. See also Venezuela Venezuelan music Laudelino Mejías Ilan Chester External links Venciclopedia: Letra e historia de Conticinio. Spanish-language songs Venezuelan songs
https://en.wikipedia.org/wiki/Alberto%20O.%20Mendelzon
Alberto O. Mendelzon was an Argentine-Canadian computer scientist who died on June 16, 2005. Life Alberto Mendelzon was born in Buenos Aires, Argentina. He graduated from the University of Buenos Aires in 1973. He then received a Ph.D. degree from Princeton University in 1979, where his advisor was Jeffrey Ullman. After that he was a post-doctoral fellow at the IBM T.J. Watson Research Center for a year before joining the faculty of the University of Toronto in 1980. He was one of the pioneers who helped to lay the foundations of relational databases. His early work on database dependencies has been influential in both the theory and practice of data management. He has made fundamental contributions in the areas of graphical query languages, knowledge-base systems, and on-line analytic processing. His work has provided the foundation for languages used to query the structure of the web. Mendelzon established some of the earliest results on using the relational data model. Together with his thesis advisor, Jeffrey Ullman, and fellow Princeton students, including David Maier and Yehoshua Sagiv, he co-authored a number of influential papers that laid out the fundamental issues and approaches for relational databases. In a now-famous paper (Maier, Mendelzon and Sagiv, TODS 1979), he introduced the chase, a method for testing implication of data dependencies that is now of widespread use in the database theory literature. This work has been highly influential: it is used, directly or indirectly, on an everyday basis by people who design databases, and it is used in commercial systems to reason about the consistency and correctness of a data design. New applications of the chase in meta-data management and data exchange are still being discovered. In the 1980s, Mendelzon began an important line of work on graphical query languages. His work has been called prescient as it began before the World Wide Web, and nonetheless established many of the scientific principles required for designing languages to query the Web. More recently, Mendelzon was a central figure in the work on view-based querying. Starting with the innovative LMSS95 paper (Levy, Mendelzon, Sagiv, and Srivastava, PODS 1995) that introduced the problem of answering queries using views, Alberto Mendelzon made several important contributions to the emerging area of view-based modeling and processing. His research was central to the development of many areas of database research such as database design, semantic query optimization, graphical query languages, and querying web data. In addition, he also made important contributions to recursive query languages, on-line analytic processing, similarity-based queries, data warehouses and view maintenance, algorithms for computing web page reputations, and indexing of XML data. Mendelzon was an active member of both the database theory and database systems research communities. He served as the PC Chair for ACM PODS in 1991 and as General C
https://en.wikipedia.org/wiki/Babel%20Middleware
Babel is an open source middleware system serving the scientific computing community. As a language interoperability tool, Babel enables the arbitrary mixing of software libraries written in C/C++, Fortran, Python, and Java. As a distributed computing platform, Babel provides a language-neutral Remote Method Invocation (RMI) scheme similar to Java's RMI which allows third-party plug-ins to specify custom data encodings and network protocols. How it works Babel requires developers to use an interface description language to specify the platform and language neutral interface to code. Babel uses a custom dialect called SIDL (Scientific Interface Definition Language), which has adaptations specific to computational science and engineering applications. The Babel tool parses the SIDL specification to generate source code which provides the glue between programming languages. Babel works on all known POSIX and Unix variants, including Linux, Mac OS X, AIX, IRIX, Solaris, Tru64, Cray's XT4, IBM's Blue Gene, and many commodity clusters. Babel does not require special compiler or linker technology and works with GNU, Intel, IBM, PathScale, PGI, and many other compilers. Babel is distributed under an LGPL license. Impact Babel won an R&D 100 Award in 2006. It has been used in diverse computational applications such as accelerator beam dynamics, cell biology, chemistry, climate, electron effects, fusion, geomagnetics, materials, nuclear power plants, radio astronomy, and subsurface transport as well as infrastructure such as frameworks, meshing, solvers, sparse linear algebra, and sourcecode refactoring. Babel is also redistributed with some customer applications, the CCA framework, and Debian Linux. History Babel was started as an internal research project on software components at Lawrence Livermore National Laboratory in 1999. The first public (alpha) release of Babel was in 2001. Also in 2001 it secured funding from SciDAC (Scientific Discovery Through Advanced Computing) along with its collaborators in the CCA Forum (Common Component Architecture Forum). Community Babel development and maintenance is currently funded by United States Department of Energy, but relies heavily on an open source community. Contributors hail from Sandia National Laboratories, Argonne National Laboratory, Oak Ridge National Laboratory, Tech-X Corp, MIT, University of Utah, and more. The Babel development team maintain open software repositories, mailing lists, and issue trackers. See also CORBA COM SWIG Enduro/X References External links Babel home page CCA Forum home page SciDAC home page Programming tools Free computer programming tools Scripting languages
https://en.wikipedia.org/wiki/The%20Dish%20%28TV%20series%29
The Dish was an American satirical television series that aired on the Style Network. The show (first airing August 16, 2008), hosted by Danielle Fishel, skewers the latest in pop culture (television, movies, magazines, celebrities, etc.) in similar fashion to sister network E! Entertainment Television's series The Soup. The show also aired on International E! channels alongside The Soup. The show's final episode aired March 20, 2011, two months after the merger of NBCUniversal and Comcast was completed. The merger had brought former competitors Bravo and Oxygen under common NBCUniversal ownership with Style, nullifying much of the video material available to The Dish, as many Bravo and Oxygen programs under NBC's ownership apart from Style had been used for satirical purposes for the show. Format As with The Soup, the show primarily consists of Fishel providing humorous commentary on content (such as clips of television programs), arranged in themed segments. Unlike The Soup however, the show places more emphasis on fashion and celebrity culture. A running gag throughout the series was Fishel's being typecast and being recognized solely for her most famous role as Topanga Lawrence from Boy Meets World. Segments Regular segments "Hot Dish" – The segment includes celebrity news and gossip of the week. "Clip Closet" – Clips are shown recapping different shows of that week. Often signaled by a closet with TV show title cards and the Clip Closet logo appears in one of the cards. This segment runs in a very similar fashion to Reality Show Clip Time on The Soup. "Daylight Cravings" – This segment covers morning shows, like The View and Rachael Ray. "F-Bombs" – Fashion bombs. This segment covers bad celebrity fashions. There are also Viewer F-Bombs where viewers show their own pictures of bad fashion moments. "Let's Go Shopping" – Highlighting accessories, gifts and online items. "Freak of the Week" – At the end of the show, Fishel shows a clip of someone freaking out. It is usually a participant in a reality show, but occasionally it is a fictional character in a scripted show. Semi-regular segments "Gaga MegaTracker 10000"* – This segment shows Lady Gaga's latest activity and fashions. "Great Moments in Modern Literature"* – This segment covers recent releases of books. "Here Comes the Brides" – Features clips from wedding shows, such as My Big Redneck Wedding, Bridezillas, etc. "What the @#!*% is going on in this AD?"* – This segment covers ads in magazines that are unusual. Former segments "Celebrity Trend Alert" – The segment highlighted what celebrities are wearing the week of the episode "Hit and Runway" – Featured clips from the Project Runway episode of that week. This feature was canceled at the end of Project Runway's fifth season. "Who Wore It Why?" – This section highlighted on bizarre celebrity outfits. "My Favorite Dish" – This feature would show Danielle's favorite clip of the week. References External links 2000s American s
https://en.wikipedia.org/wiki/Symposium%20on%20Principles%20of%20Database%20Systems
The ACM Symposium on Principles of Database Systems (PODS) is an international research conference on database theory, and has been held yearly since 1982. It is sponsored by three Association for Computing Machinery SIGs, SIGAI, SIGACT, and SIGMOD. Since 1991, PODS has been held jointly with the ACM SIGMOD Conference, a research conference on systems aspects of data management. PODS is regarded as one of the top conferences in the area of database theory and data algorithms. It holds the highest rating of A* in the CORE2021 ranking . The conference typically accepts between 20 and 40 papers each year, with acceptance rates fluctuating between 25% and 35%. External links dblp: Symposium on Principles of Database Systems (PODS) Database theory Computer science conferences Association for Computing Machinery conferences
https://en.wikipedia.org/wiki/Joseph%20M.%20Hellerstein
Joseph M. Hellerstein (born ) is an American professor of Computer Science at the University of California, Berkeley, where he works on database systems and computer networks. He co-founded Trifacta with Jeffrey Heer and Sean Kandel in 2012, which stemmed from their research project, Wrangler. Education Hellerstein attended Harvard University from 1986 to 1990 (AB computer science) and pursued his master's degree in computer science at University of California, Berkeley from 1991 to 1992. He received his Ph.D., also in computer science, from the University of Wisconsin, Madison in 1995, for a thesis on query optimization supervised by Jeffrey Naughton and Michael Stonebraker. Research Hellerstein has made contributions to many areas of database systems, such as ad-hoc sensor networks, adaptive query processing, approximate query processing and online aggregation, declarative networking, and data stream processing. Awards and recognition Hellerstein's work has been recognized with an Alfred P. Sloan Fellowship, MIT Technology Review's inaugural TR100 list and TR10 list, Fortune 50 smartest in Tech, and three ACM-SIGMOD "Test of Time" awards. He is a Fellow of the Association for Computing Machinery (2009). References American computer scientists Database researchers Living people Harvard University alumni University of California, Berkeley alumni University of Wisconsin–Madison College of Letters and Science alumni Fellows of the Association for Computing Machinery UC Berkeley College of Engineering faculty Year of birth missing (living people)
https://en.wikipedia.org/wiki/Seven%20Network%20Olympic%20broadcasts
The broadcasts of Summer and Winter Olympic Games produced by Seven Sport is televised on the Seven Network in Australia. Seven first broadcast the Olympics in 1956, jointly with the Nine Network and the ABC. It has since broadcast Olympic games intermittently, either jointly with other broadcasters or solely. History Early history The Seven Network was a joint broadcaster for the 1956 Summer Olympics held in Melbourne, which was the first Olympics telecast in Australia, which it shared with the ABC and Nine television stations in Melbourne and Sydney. The same trio of broadcasters telecast the 1976 Summer Olympics, before Seven gained exclusivity for the 1980 Summer Olympics. It lost the rights for the next two Games before regaining rights from 1992. With rising costs associated with purchasing broadcasting rights, Seven shared the telecast with SBS for the 2004 and 2008 Games. Recent years Seven held Australian free-to-air, pay television, online, and mobile telephony broadcast rights to the 2008 Summer Olympics in Beijing, on-selling some events to SBS. The live telecast of the Games of the XXIX Olympiad was shared by both the Seven Network and SBS Television. Seven broadcast the opening and closing ceremonies and mainstream sports, including swimming, athletics, rowing, cycling, and gymnastics. In contrast, SBS TV provided complementary coverage focused on long-form events such as football, road cycling, volleyball, and table tennis. Seven lost its Olympics rights for the 2010 Winter Olympics and the 2012 Summer Olympics to a joint bid by the Nine Network and Foxtel. Rights to just the 2014 Winter Olympics were acquired by Network Ten. On 5 August 2014, it was announced that Seven had acquired rights to the Olympics in Australia across all platforms for an undisclosed amount, in a deal lasting from 2016 through 2020, and also including the 2014 Summer Youth Olympics. IOC president Thomas Bach praised the deal, stating that the Committee "enjoys long term partnerships and this agreement is something of a homecoming between us and Seven." Seven West Media CEO Tim Worner explained that unlike previous stints as rightsholder, it would not necessarily have to sub-license the Games to a secondary broadcaster (as it had historically done with the ABC), stating that "[with] around 150 hours of content on any given day, there will be many more opportunities than ever before". However, Worner did not rule out the possibility of doing so. For the 2016 Summer Olympics, coverage was offered across Seven, 7Two and 7mate. In order to allow Games to be broadcast in high definition in all capital cities, 7HD was temporarily changed to a simulcast of Seven's primary channel in Sydney, Brisbane and Perth for the duration of the Games. The Games were also streamed through a freemium mobile app; full access to Games content (including coverage of all events on live and on-demand basis) required purchase of a "premium" service costing $19.99. This content
https://en.wikipedia.org/wiki/BricsCAD
BricsCAD is a software application for computer-aided design (CAD), developed by Bricsys nv. The company was founded in 2002 by Erik de Keyser, a longtime CAD entrepreneur. In 2011 Bricsys acquired the intellectual property rights from Ledas for constraints-based parametric design tools, permitting the development of applications in the areas of direct modeling and assembly design. Bricsys is headquartered in Ghent, Belgium, and has additional development centers in Nizhny Novgorod and Novosibirsk, Russia; Bucharest, Romania and Singapore. Bricsys is a founding member of the Open Design Alliance, and joined the BuildingSMART International consortium in December 2016. In 2018, Bricsys nv was acquired in full by Hexagon AB of Sweden. The BricsCAD Editions Today, BricsCAD is available for the Windows, Linux and macOS operating systems, and comes in five, workflow-centric Editions. Prior to the release of V21, a sixth edition called BricsCAD Platinum was available. With the release of V21, all BricsCAD Platinum functionality was moved to BricsCAD Pro, and the Platinum Edition was deprecated. BricsCAD Lite (BricsCAD Classic' in V20 and below) is designed and optimized for 2D drafting workflows. It reads and writes native DWG, and offers a LISP API for customization and the automation of repetitive tasks. BricsCAD Pro contains all the functionality of BricsCAD Lite, plus 3D modeling and parametrics, standard part libraries, a rendering engine, a materials library, and an Autodesk AutoCAD ObjectARX-compatible development system that supports hundreds of third-party application programs. In V21 and above, BricsCAD Pro offers the features of the deprecated Platinum Edition, including 3D constraint system management, surface entity creation and lofting, TIN surface creation, deformable modeling, automatic healing of imported solid geometry, automatic design intent recognition, and basic assembly creation & editing. BricsCAD BIM contains the functionality of BricsCAD Pro, and adds a concept-through-documentation Building Information Modeling workflow. BricsCAD BIM uses ACIS as its core modeler, allowing push-pull, free-form development of concept models. Low level-of-development (LOD) massing models can be automatically converted to a Building Information Model using an A.I.-assisted workflow, called BIMIFY. BricsCAD BIM also supports the concept of "continuous Level of Development" via a machine learning / A.I.-assisted feature named PROPAGATE. This feature supports the concept of "model once, use many times" with regard to BIM data refinement. In BricsCAD BIM V21, sheet set generation has also been automated, with the first delivery of a drawing sheet standards manager. The core database schema of BricsCAD BIM is based on the Industry Foundation Classes (IFC) from BuildingSMART International. BricsCAD BIM is certified by BuildingSMART International as compliant with the IFC openBIM 'IFC4' import and export schemas. BricsCAD Mechanical contains all
https://en.wikipedia.org/wiki/Brandon%20Soo%20Hoo
Brandon Soo Hoo (born November 2, 1995) is an American actor and martial artist known for playing Tran in the 2008 film Tropic Thunder and for his series regular role on the Cartoon Network sketch comedy series Incredible Crew. Soo Hoo played Scott Fuller on the El Rey Network horror-drama series From Dusk till Dawn: The Series, based on the film of the same name. Early life Brandon Soo Hoo was born in Pasadena, California on November 2, 1995. He is of Chinese descent. Career Brandon began his acting career at the age of 10, when he was featured in television advertisements for Toys "R" Us, Land Rover, and ExxonMobil. In 2007, he had a minor role on Sesame Street. Soo Hoo made his feature film debut in Ben Stiller's comedy film Tropic Thunder (2008), playing the role of Tran, a young leader of the Flaming Dragon gang; he won a Young Artist Award for his performance. In 2009, he portrayed Young Storm Shadow in the action film G.I. Joe: The Rise of Cobra, and was again nominated for a Young Artist Award for his performance. Soo Hoo guest starred on the NBC comedy series My Name is Earl and the Fox sitcom 'Til Death. In 2010, he had guest starring role on NBC's comedy series Community. Soo Hoo then had a recurring role as Connor on Nickelodeon's Supah Ninjas. In 2013, he co-starred as Fly Molo in the science fiction film Ender's Game, alongside Harrison Ford, Ben Kingsley, and Asa Butterfield. Soo Hoo was then part of the regular cast of the Cartoon Network sketch comedy series Incredible Crew, created by Nick Cannon. From 2014 to 2016, he starred as Scott Fuller on the El Rey Network horror-drama series From Dusk till Dawn: The Series, a television adaptation of Robert Rodriguez's film of the same name. In 2015, he starred as Seth in the film Everything Before Us. In 2016, he provided the voice of Garfield Logan / Beast Boy in the DC Comics animated direct-to-video film Justice League vs. Teen Titans. In September 2018, he appeared in a Wong Fu Production video Asian Bachelorette 2, a sequel to Asian Bachelorette. Personal life Soo Hoo is a practitioner of taekwondo. Filmography References External links 1995 births American male actors of Chinese descent 21st-century American male actors American male child actors American male film actors American male television actors American male voice actors American male taekwondo practitioners American Wing Chun practitioners Chinese Wing Chun practitioners Living people Male actors from Pasadena, California
https://en.wikipedia.org/wiki/Comparison%20of%20CAD%2C%20CAM%2C%20and%20CAE%20file%20viewers
This is an overview of notable viewers for files, that are produced by Computer aided design (CAD), Computer-aided manufacturing (CAM) and Computer-aided engineering (CAE) applications. Comparison of notable CAD/CAM/CAE file viewers See also Comparison of computer-aided design software List of CAD file formats References Computer-aided engineering Computer-aided manufacturing Computer-aided design CAD, CAM and CAE file viewers
https://en.wikipedia.org/wiki/Banking%20agent
A banking agent is a retail or postal outlet contracted by a financial institution or a mobile network operator to process clients’ transactions. Rather than a branch teller, it is the owner or an employee of the retail outlet who conducts the transaction and lets clients deposit, withdraw, transfer funds, pay their bills, inquire about an account balance, or receive government benefits or a direct deposit from their employer. Banking agents can be pharmacies, supermarkets, convenience stores, lottery outlets, post offices, and more. Globally, these retailers and post offices are increasingly utilized as important distribution channels for financial institutions. The points of service range from post offices in the Outback of Australia where clients from all banks can conduct their transactions, to rural France where the bank Crédit Agricole uses corner stores to provide financial services, to small lottery outlets in Brazil at which clients can receive their social payments and access their bank accounts. Banking agents are usually equipped with a combination of point-of-sale (POS) card reader, mobile phone, barcode scanner to scan bills for bill payment transactions, personal identification number (PIN) pads, and sometimes personal computers (PCs) that connect with the bank's server using a personal dial-up or other data connection. Clients that transact at the agent use a magstripe bank card or their mobile phone to access their bank account or e-wallet respectively. Identification of customers is normally done through a PIN, but could also involve biometrics. With regard to the transaction verification, authorization, and settlement platform, banking agents are similar to any other remote bank channel. Local regulation will determine if financial institutions are allowed to work through retail outlets. Regulators generally determine what kind of, if any, financial institutions are permitted to contract banking agents, what products can be offered at the retail outlets, how financial institutions have to handle cash transport, know your customer requirements, consumer protection, and other operational areas. Rationale for banking agents Banking agents help financial institutions to divert existing customers from crowded branches providing a “complementary”, often more convenient channel. Other financial institutions, especially in developing markets, use agents to reach an “additional” client segment or geography. Reaching poor clients in rural areas is often prohibitively expensive for financial institutions since transaction numbers and volumes do not cover the cost of a branch. In such environments banking agents that piggy back on existing retail infrastructure – and lower set up and running cost - can play a vital role in offering many low-income people their first-time access to a range of financial services. Also, low-income clients often feel more comfortable banking at their local store than walking into a marble branch. B
https://en.wikipedia.org/wiki/Cross%20File%20Transfer
CFT (Cross File Transfer) (product name: Axway Transfer CFT) is a secure computer file transfer program and protocol from Axway Inc, used extensively in Finance and banking industries in Europe, by companies like AG2R La Mondiale and Swiss Post. CFT was for mainframe computers using the French X.25-based Transpac network, but was later ported to use Internet protocols (TCP/IP) as well. Client software must be purchased from Axway, and includes a license manager that enforce machine and transfer limits. Purpose CFT is used for machine to machine file transfer with remote control for resuming interrupted transfers. CFT can also trigger remote processes, rename files according to a specific protocol (PeSIT, ODETTE (OFTPv1), SFTP), apply security constraints and implement the encoding conversion (ASCII to EBCDIC for example). In older version CFT transfer use for protocol EBICS and ETEBAC 3. Use Each site wishing to exchange a file is called a partner, regardless of the platform. Any partner wishing to send or receive data from another partner must be declared in “the partners file” or “CFT directory”. To share files, CFT must be installed on each platform. A platform that wants to send a file to a remote partner sends a request over the network by specifying the remote platform through its partner name. When the remote partner receives the request, it verifies that it is the correct destination and creates a record in its local catalogue that lists all requests (treated FIFO). When it’s the request’s turn to be processed, the partner establishes a remote connection protocol with the push partner and announces it is ready to receive. The sending partner sends the file content that the receiving partner mirrors to a local directory. The sending partner doesn’t decide where the file is written on the receiving partner. He can not force the receiving partner to receive data (when it is congested, for example). CFT indicates the status of each transfer at all times: pending, in progress, aborted or completed successfully. CFT is a licensed product. It is used with a software key that limits the use of CFT to a type of machine and a maximum number of simultaneous transfers. In the case of a UNIX Sun Solaris box, the CFT should be installed on both the sender and the receiver machines. There are two main config files for XFB (AXway File Broker) namely locpart.smp and chkusr.txt. locpart.smp stores the destination server's IP address, protocol intended, port to be used and other such information. TCP and FTP are the basic protocols used here. The file chkusr.txt contains information specific to authorization and proxy. If a user is sending files to a receiver, the latter should have an A entry in its chkusr.txt file to authorize the user to send files. It should also contain the landing directory to which the files should be written in the receiving system. The sending machine also has an agent file named , where the file name to be se
https://en.wikipedia.org/wiki/Firefox%20for%20Android
Firefox for Android is a web browser developed by Mozilla for Android smartphones and tablet computers. As with its desktop version, it uses the Gecko layout engine, and supports features such as synchronization with Firefox Sync, and add-ons. The initial version of Firefox for Android was codenamed Fennec and branded Firefox for mobile; it initially supported Maemo and Android before supporting MeeGo and Firefox OS as well. Support for Maemo was later dropped. In 2020, a redesigned version of Firefox for Android (codenamed Fenix, and also branded as Firefox Daylight) was released, which introduced a new internal architecture and user interface inspired by Firefox Focus, new privacy features, and switching to curated WebExtensions for add-ons. History Firefox for mobile, codenamed "Fennec", was first released for Maemo in January 2010 with version 1.0 and for Android in March 2011 with version 4.0. Support for Maemo was discontinued after version 7, released in September 2011. The codename Fennec comes from the fennec fox, a small desert fox (just as the Fennec browser is a small version of the Firefox desktop browser). Firefox for Maemo Beta 5, released in 2009, was the first version to have the official Firefox branding, with the Firefox name and logo. Fennec uses the Gecko engine; for example, version 1.0 used the same engine as Firefox 3.6, and the following release, 4.0, shared core code with Firefox 4.0. Its features include HTML5 support, Firefox Sync, add-ons support and tabbed browsing. The browser's version numbering was bumped from version 2.0 beta to version 4.0 to more closely match desktop releases of Firefox since the rendering engines used in both browsers are the same. Plugin support was initially disabled by default, removing compatibility with popular web content types such as Adobe Flash. In September 2011, Flash support was implemented in pre-release builds for pre-Honeycomb versions of Android. Flash support for Android 2.x and 4.x was enabled for most smartphones in version 14.0; later it was removed in version 56.0. On June 27, 2019, Mozilla unveiled Firefox Preview (codename "Fenix"), a redesigned version of Firefox for Android based on GeckoView an implementation of Gecko that is decoupled as a reusable library, intended to be used as an alternative to the default Android WebView component (based on Blink engine). GeckoView was first used by Firefox Focus, whose design influenced aspects of Fenix. It has a redesigned user interface with support for dark mode, a new "Collections" feature for saving sets of tabs, and includes Enhanced Tracking Protection (a configurable blocker for web trackers and third-party cookies) and a redesigned private browsing mode. The Firefox for Android Beta channel was migrated to the Fenix branch in April 2020, and it was officially released to the stable channel in August 2020 as version 79, branded as Firefox Daylight. The last Fennec-based version was version 68, which was released
https://en.wikipedia.org/wiki/704th%20Military%20Intelligence%20Brigade
The 704th Military Intelligence Brigade, a subordinate unit of the U.S. Army Intelligence and Security Command, conducts synchronized full-spectrum signals intelligence, computer network, and information assurance operations directly and through the National Security Agency to satisfy national, joint, combined and Army information requirements. Headquarters and Headquarters Company 741st Military Intelligence Battalion 742nd Military Intelligence Battalion 743rd Military Intelligence Battalion United States Army Technical Support Squadron (USATSS) 741st MI Battalion This Battalion is stationed at Fort George G. Meade, Maryland. The 741st MI Battalion provides soldiers to conduct information superiority operations within the National Security Agency and Central Security Service; linguist support to the National Security Agency, the intelligence community and other U.S. government agencies; and operates the Joint Training Center on behalf of the INSCOM, Air Intelligence Agency and Naval Network Warfare Command. 742nd MI Battalion Also at Fort George G. Meade, the 742nd conducts contributory analysis and reporting through the Army Technical Control and Analysis Element, carries out information operations and supports satellite communications systems. 743rd MI Battalion Located at Buckley Space Force Base, Colorado, the 743rd provides technically qualified “space smart” soldiers for exercises and in support of tactical commanders. References External links and Sources Brigade Website Brigade Lineage US Army Intelligence and Security Command 704 Military units and formations established in 1988
https://en.wikipedia.org/wiki/Trolleybuses%20in%20Glasgow
The Glasgow trolleybus system operated in and immediately surrounding the city of Glasgow, Scotland, between 1949 and 1967, with the network reaching its largest extent in 1959. It was the only British system to open after World War II. The trolleybuses were owned and operated by Glasgow Corporation's Transport Department (along with the city's buses, trams and the Subway). Routes All Glasgow's trolleybus routes were numbered from 101 onwards. Summary of services: 101: Started on 6 November 1949, initially between Shawfield and Cathedral Street (replacing part of tram route 10). The route was eventually extended to run between Rutherglen and Riddrie. Closed on 20 April 1966 and replaced by bus route 27. 102: Started on 3 April 1949, initially between Polmadie and Riddrie (replacing tram route 2). Cut back from Riddrie to Royston Road on 2 September 1962. Withdrawn on 30 April 1966. 103: Southerly extension of route 102 to Hampden Park, starting on 3 July 1949 (but not renumbered 103 until 6 August 1950). Withdrawn on 9 May 1959. 104: Started on 31 August 1952 between Muirend and Cathedral Street, replacing part of motorbus route 37. Withdrawn on 6 January 1962.t 105: Started on 5 July 1953 between Queen's Cross and Clarkston, replacing part of tram route 13. Withdrawn on 27 May 1967 and replaced by bus route 66. This was the last trolleybus route to operate in Scotland. 106: Started on 15 June 1958 between Millerston or Riddrie and Bellahouston, replacing tram route 7. Additional rush hour services to Linthouse and Shieldhall were replaced by motorbus route 106 on 14 November 1964, due to the construction of the Clyde Tunnel. Service withdrawn on 1 October 1966 and replaced by bus route 65. 107: Started 7 May 1958 between Maitland Street and Muirend, replacing parts of motorbus routes 18 and 43. Withdrawn 4 March 1967 and replaced by bus 67. 108: Started 15 November 1958 between Mount Florida and Paisley Road Toll (actually The Old Govan Town Hall at Princes Dock, was where this route turned around, after Tunnel opened), replacing tram service 12. Rush hour services to Linthouse and Shieldhall withdrawn on 14 November 1964 (see route 106). Withdrawn 4 March 1967 and replaced by bus 68. Vehicles The majority of Glasgow's trolleybuses were double-deck vehicles, painted in Glasgow Corporation's orange, green and cream livery (though in a different style from the buses and trams). The destination blinds on the trolleybuses used white letters on a green background (unlike the trams and buses, with more conventional white lettering on a black background). Glasgow's first trolleybuses were a fleet of 34 three axle (six-wheeled), double-deck B.U.T. vehicles with bodywork by Metro-Cammell of Birmingham. They were almost identical to those built for London Transport, even briefly including London's distinctive trolleybus symbol (a "T" over the London Transport roundel). In 1950 Glasgow bought 30 Daimler trolleybuses. Between 1957 and 1959, a fleet
https://en.wikipedia.org/wiki/2008%E2%80%9309%20United%20States%20network%20television%20schedule%20%28daytime%29
The 2008–09 daytime network television schedule for the four major English-language commercial broadcast networks in the United States covers the weekday and weekend afternoon hours from September 2008 to August 2009. The schedule is followed by a list per network of returning and cancelled shows from the 2007–08 season. Affiliates fill time periods not occupied by network programs with local or syndicated programming. PBS – which offers daytime programming through a children's program block, PBS Kids – is not included, as its member television stations have local flexibility over most of their schedules and broadcast times for network shows may vary. Also not included are MyNetworkTV (as the programming service doesn't offer daytime programs of any kind), and Ion Television (as its schedule is composed mainly of syndicated reruns). Fox is not included on the weekday schedule: Fox only airs daytime programming (in the form of sports on weekend afternoons). Legend Schedule New series are highlighted in bold. All times correspond to U.S. Eastern and Pacific Time (select shows) scheduling (except for some live sports or events). Except where affiliates slot certain programs outside their network-dictated timeslots, subtract one hour for Central, Mountain, Pacific (for selected shows), Alaska, and Hawaii-Aleutian times. Local schedules may differ, as affiliates have the option to pre-empt or delay network programs. Such scheduling may be limited to preemptions caused by local or national breaking news or weather coverage (which may force stations to tape delay certain programs in overnight timeslots or defer them to a co-operated station or digital subchannel in their regular timeslot) and any major sports events scheduled to air in a weekday timeslot (mainly during major holidays). Stations may air shows at other times at their preference. All sporting events air live in all time zones in U.S. Eastern time, with local and/or primetime programming after game completion. Weekdays {| class="wikitable sortable" style="width:100%;margin-right:0;font-size:90%;text-align:center" |- ! style="background:#C0C0C0; width:1.5%; text-align:center;"|Network ! width="4%" style="background:#C0C0C0; text-align:center;"|6:00 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|6:30 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|7:00 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|7:30 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|8:00 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|8:30 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|9:00 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|9:30 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|10:00 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|10:30 a.m. ! width="4%" style="background:#C0C0C0; text-align:center;"|11:00 a.m. ! width="4%" style="background:#C0C0C0; text-
https://en.wikipedia.org/wiki/Big%20Dam%20Film%20Festival
The Big Dam Film Festival is an annual event organized by Young Professionals of the Quincy Area, a Non-Profit Networking and Community Development organization in Quincy, Illinois. The festival features independent films from around the world in a showcase format usually held on a Saturday evening during the spring. The proceeds from the event are used to organize and support events and endeavors throughout the community of Quincy, Illinois. Origins The Big Dam Film Festival was established by Clinton Begley and Christopher Mackenzie, who are both natives of Quincy, Illinois and members of the Young Professionals of Quincy board. The festival is named after Lock and dam, #21 on the Mississippi river which is an icon local to Quincy, and a source of revenue for the city. The inaugural event occurred in February 2006, featuring 23 films selected from over 80 total films that were submitted for selection. A short video introduction by Ed Begley, Jr. began the event. History Since its inception, each event has sold out well in advance. It has been subject to rave reviews and praise. Clinton Begley and Christopher Mackenzie actively participated in the planning and coordination of the events throughout the transitional year of 2009 when a sub-committee of Young Professional's Quincy took over the majority of planning. Begley and Mackenzie have since divested themselves of planning future festivals. The 2010 festival, under direction of the newly formed committee, saw a change in direction and format. Instead of a single evening of short films, two separate evenings of feature-length films were shown. Locally produced "Hampshire" was screened on Thursday, May 7 at McHugh Theater on the campus of Quincy University. Friday night hosted locally produced short " A night in Woodlawn" and critically acclaimed An Education as the feature presentation. In 2011, the two-night format was retained and the feature-length documentary "Beer Wars" was screened Friday night while the original "shorts" festival was preserved for Saturday night at the State Room. Festivals External links The Big Dam Film Festival Official Site Young Professionals Quincy Official site Film festivals in Illinois
https://en.wikipedia.org/wiki/Alan%20Kay%20%28disambiguation%29
Alan Kay is a computer scientist known for his work at the Xerox Palo Alto Research Center. Alan Kay may also refer to: Alan Kay (judge), US magistrate judge in Washington DC Alan Cooke Kay (born 1932), US District Court judge for the District of Hawaii Alan Kay (footballer) (born 1961), Scottish footballer Alan Kay, season 1 winner of the TV series Alone See also Alan Kaye (disambiguation) Allen Kay (born 1945), American advertising executive Allan K. (born 1958), Filipino entertainer
https://en.wikipedia.org/wiki/Fox%20%28Turkish%20TV%20channel%29
Fox is one of the leading free-to-air TV networks broadcasting in Turkey. Since July 2012, Fox TV broadcasts in 16:9. History The channel was originally TGRT (acronym in Turkish as: 'Türkiye Gazetesi Radyo Televizyonu'; Turkey Newspaper Radio Television) and began broadcasting on April 23, 1993, under İhlas Holding. Between 2001 and 2004, TGRT was owned by Tasarruf Mevduatı Sigorta Fonu before being sold again to İhlas Holding. On July 23, 2006, News Corporation acquired TGRT from İhlas Holding, and was formed by Ahmet Ertegün. The channel was later relaunched as Fox on February 24, 2007. David Parker Reid was the General Manager of Fox Turkey between 2006 and 2009. David Parker Reid, Hakan Etus, Koray Altinsoy, Doğan Şentürk played crucial role as the most senior executives about the establishment of the Fox channel in Turkey. After David Parker Reid's leave, Pietro Vicari served as General Manager from 2009 to 2014. On November 26, 2014, Adam Theiler was appointed as the General Manager of Fox TV. Programs broadcast by Fox Unlike other international Fox channels which generally focus on syndicated programmes primarily from the United States, Fox Turkey focuses on original programming. Weekly Series It is a list of television programs that have been broadcast on Fox before or are currently being broadcast. 2023-: Ruhun Duymaz (Love Undercover) (Ended) 2023-: Yaz Şarkısı (Melody Love) (Ended) 2023-: Kısmet (The Fate) (Ended) 2023-: Yabani (Wild) (Tuesday at 20:00) 2023-: Bambaşka Biri (Someone Else) (Mondays at 20:00) 2023 Kader Bağları (Grapes of Love) (Saturdays at 20:00) References External links Official website Fox (Turkey) at LyngSat Address Television stations in Turkey Television channels and stations established in 2007 Turkey Turkish-language television stations
https://en.wikipedia.org/wiki/Yesmail
Yesmail Interactive, is now known as Data Axle. The email marketing provider was previously headquartered in Portland, Oregon. Data Axle is headquartered in Dallas, Texas and has offices in San Francisco, Los Angeles, New York, Chicago, Boston, Atlanta, Omaha, Toronto, London and Singapore. History Yesmail first started as a Web directory in 1995 and was later named Starting Point Directory in 1997. The website became one of the top 10 most visited sites on the web and was operated by co-owner and webmaster, Frank Addante, serial entrepreneur. The company was created after its initial business, WebPromote, Inc. and its founders, Ken Wruk, Kevin Manley, John Weiss, and Keith Speer merged with a new firm founded by Mike Santer, Alex Hern and executives David Tolmie (CEO) and Peder Jungck (CTO) in early 1999. The new firm was named Yesmail.com. The business grew based on its ability to use technology to manage its database of millions of e-mail addresses. Yesmail's growth led to a $37 million IPO in the fall of 1999, and was acquired by CMGI in 2000 for $520 million. Yesmail was later acquired by infoUSA in 2003. In November, 2006, Yesmail agreed to pay a $50,717 civil penalty to settle Federal Trade Commission charges that it violated the CAN-SPAM Act of 2003 by sending unsolicited commercial e-mails after consumers asked it to stop doing so. The FTC charged Yesmail, "doing business as @Once" at the time of the violation in 2004, with sending e-mail messages on behalf of its clients more than 10 business days after recipients had opted out. Citing the problem as one of the minor technical issues allowed under the Act, and not a violation of federal law, Yesmail deemed the charges too costly to fight, and agreed to settle. "Doing business as @Once" means the issue related to an incident that took place in 2004 before @once Inc. (then a Portland, OR-based e-mail marketing company) was integrated (along with its liabilities) in 2005 with infoUSA's existing e-mail subsidiary Yesmail. In April 2017, Yesmail became known as Yes Lifecycle Marketing. In 2019, it dropped "Lifecycle" and became known as Yes Marketing. In May 2019, Yes Marketing, the announced that it would be sunsetting Yesmail. Yes Marketing will support its proprietary Yesmail platform for the next 36 months while actively migrating current clients onto Adobe Campaign. Acquisitions Markado, 2003 @once, 2005 Digital Connexxions, 2006 See also Email marketing References External links infoUSA, Inc. Company Profile Digital marketing companies of the United States Companies based in Omaha, Nebraska Companies based in Portland, Oregon Marketing companies established in 1995
https://en.wikipedia.org/wiki/CGNET%20Services%20International
CGNET Services International, based in Mountain View, California, is an example of an early pioneer in international data communications. Beginning with landmark achievements in the 1980s and 1990s, CGNET has become one of the world's most well-known email providers in the international nonprofit community. Founded in 1983 by Georg Lindsey, CGNET built some of the earliest international email networks, providing custom email services over the Dialcom network in 1984 and later moved to the Internet. Before the Internet, organizations usually sent mail over private data networks. While individuals could use email services on some value-added carriers, they had not been configured to serve organizations. CGNET changed this when it set up organizational communications over Dialcom. In the 1990s, it performed a similar feat by providing its customers with an early version of Voice over IP, which did not use the VoIP protocols but made it possible to transmit voice over IP networks using statistical multiplexing. CGNET's first client was the Consultative Group on International Agricultural Research (CGIAR), from which CGNET derived its name. Since then, virtually all of its customers are reported as nonprofits, foundations or non-governmental organizations. CGNET's international experience includes several times when it has relocated clients' facilities or rerouted their email because their offices have been caught in the middle of armed rebellions or similar disorders. External links Official Website Notes Information technology companies of the United States Companies based in Mountain View, California Technology companies established in 1983 1983 establishments in California
https://en.wikipedia.org/wiki/Ludachristmas
"Ludachristmas" is the ninth episode of the second season of the television series 30 Rock and was first broadcast on December 13, 2007, on the NBC network in the United States. The episode was written by Tami Sagher and directed by Don Scardino. Guest stars in this episode include Kevin Brown, Kay Cannon, Grizz Chapman, Anita Gillette, Buck Henry, John Lutz, Maulik Pancholy, Andy Richter and Elaine Stritch. In this episode, Liz Lemon's (Tina Fey) family (Anita Gillette, Buck Henry, and Andy Richter) visit her for the holidays and Jack Donaghy's (Alec Baldwin) mother, Colleen Donaghy (Elaine Stritch), also visits him for the holidays. The cast and writers of TGS with Tracy Jordan, a fictional sketch comedy series, prepare to attend their annual Ludachristmas party. Tracy Jordan (Tracy Morgan) is ordered by a court to wear an alcohol monitoring device. Plot Jack is delighted when he thinks his mother, Colleen, is unable to visit him for the holidays due to her flight from Florida being grounded by Hurricane Zapato. Unexpectedly, Colleen arrives because she was able to travel by bus to Atlanta and get a flight from there. Also arriving at 30 Rockefeller Plaza is Liz's family, including her brother Mitch who as the result of a skiing accident has "Trauma Induced Nivea Aphasia" which means that his memory is stuck on December 7, 1985, and he believes that he is still 17 years old, when he is actually 40. Jack's mother immediately dislikes the Lemons due to their constant optimism and happiness. Colleen sets out to show Jack that they're just as screwed up as their relationship is. Jack, Colleen and the Lemons spend the day together and eventually end up going to dinner with each other. At the dinner, Colleen comments that it appears that Liz is the "favorite" child leading Mitch to reveal that his parents, Dick and Margaret, took him to see The Goonies in 1985 when they should have been watching Liz at her football game. Liz then gets into an argument with her parents, culminating in Mitch remembering his accident. The Lemons then spiral into a drunken fight, unknowingly falling for Colleen's plan. Meanwhile, the cast and writers of TGS are preparing their annual Ludachristmas party in the writer's room, which will involve a heavy amount of debauchery. Tracy is annoyed because he is unable to attend due to a recent order from a courtroom judge which requires him to wear an alcohol monitoring ankle bracelet. Kenneth Parcell (Jack McBrayer) is also annoyed because he believes that none of the staff know what the true meaning of Christmas is. He cancels Ludachristmas and makes the staff sit through a talk, led by himself and Reverend Gary (John F Mooney), about the meaning of Christmas. Overwhelmed with regret and self-sacrifice after Reverend Gary shows them a video of him giving happy kids pieces of wood for Christmas, the cast and writers are inspired to run outside of 30 Rock and cut down the big Christmas tree which is outside the building. Kenn
https://en.wikipedia.org/wiki/GSN%20Radio
Game Show Network Radio is an American interactive internet radio game show that originally aired live on GSN.com from August 18, 2008, to November 13, 2009, hosted by husband and wife team Bob Goen and Marianne Curan. Other co-hosts filled in when one of them was unavailable. The four-hour program featured interactive games that listeners played to win cash and other prizes. The show aired from 1–5 P.M. Eastern every Monday through Friday afternoon. Format and rules GSN Radio was an internet radio game show in which home listeners are the contestants. Listeners anywhere in the world of age 21 or older could enter the contest by using the network's website or dialing a phone number, both of which were methods free of charge. If an entry was selected to participate in the game, the contestant was called on his telephone. The contestant then, either alone or with an opponent, played live on-air. A contestant may enter 10 times via telephone and 25 times on the internet per each 24-hour period. One week after the original 24-hour period in which an entry was submitted, that entry was cleared from the queue, and any entrants who wished to play more games are required to re-enter. Some special games (occasionally referred to as Marquis Games) required that listeners register specifically for them on the GSN Radio website. For these games, a contestant may also enter 25 times each 24-hour period. These entries were not grouped with the entries of the regular games. All entries were cleared from the queue after the game was declared won (or over). Any entrants who wished to play another special game were required to re-enter. Regardless of the method of entry, each entry had an equal chance of being selected. An entry did not necessarily guarantee an opportunity to play on the show. Games GSN Radio featured various minigames that were played throughout the program. The rewards for the games were usually prizes of $100 in cash, although some games had potential payouts of $200, $1,000 and $2,500. Imagination Games partnered with GSN to bring some of their original and licensed games to the radio format. In a situation where a tie needed to be broken, a question related to the game was posed. The first contestant to yell out his name was given a chance to answer. If his answer was correct, he would be declared the winner. If he was incorrect, his opponent won by default. During its 15-month run, 33 games were played in rotation on GSN Radio. Other features Outside of the traditional mini-game shows, GSN Radio often featured other segments. Competitions Since November 6, 2008, to the cancellation of the program, in addition to the regular on-air games, GSN Radio sponsored two other competitions offering cash. {| class="wikitable" |- !width="150px" | Competition !width="500px" | Instructions |- |Captain Ca$h |Participants called the Captain Ca$h phone number and, in thirty seconds or less, left a message detailing why he thinks he should be awarded
https://en.wikipedia.org/wiki/Computer%20Physics%20Communications
Computer Physics Communications is a peer-reviewed scientific journal published by Elsevier under the North-Holland imprint. The journal focuses on computational methodology, numerical analysis and hardware and software development in support of physics and physical chemistry. Associated with the journal is the Computer Physics Communications Program Library. This resource houses computer programs which have been described in the journal. Access to the library is bundled with journal subscriptions, although those unaffiliated with a subscribing institution can purchase individual subscriptions. The current (2008) principal co-ordinating editor is N. Stanley Scott of Queen's University Belfast, Northern Ireland, who also acts as director of the Program Library. The journal's 2020 impact factor was 4.39. References External links Computer Physics Communications Table of Contents English-language journals Physics journals Elsevier academic journals
https://en.wikipedia.org/wiki/Single-page%20application
A single-page application (SPA) is a web application or website that interacts with the user by dynamically rewriting the current web page with new data from the web server, instead of the default method of a web browser loading entire new pages. The goal is faster transitions that make the website feel more like a native app. In a SPA, a page refresh never occurs; instead, all necessary HTML, JavaScript, and CSS code is either retrieved by the browser with a single page load, or the appropriate resources are dynamically loaded and added to the page as necessary, usually in response to user actions. History The origins of the term single-page application are unclear, though the concept was discussed at least as early as 2003 by technology evangelists from Netscape. Stuart Morris, a programming student at Cardiff University, Wales, wrote the self-contained website at slashdotslash.com with the same goals and functions in April 2002, and later the same year Lucas Birdeau, Kevin Hakman, Michael Peachey and Clifford Yeh described a single-page application implementation in US patent 8,136,109. Earlier forms were called rich web applications. JavaScript can be used in a web browser to display the user interface (UI), run application logic, and communicate with a web server. Mature free libraries are available that support the building of a SPA, reducing the amount of JavaScript code developers have to write. Technical approaches There are various techniques available that enable the browser to retain a single page even when the application requires server communication. Document hashes HTML authors can leverage element IDs to show or hide different sections of the HTML document. Then, using CSS, authors can use the :target pseudo-class selector to only show the section of the page which the browser navigated to. JavaScript frameworks Web browser JavaScript frameworks and libraries, such as AngularJS, Ember.js, ExtJS, Knockout.js, Meteor.js, React, Vue.js, and Svelte have adopted SPA principles. Aside from ExtJS, all of these are free. AngularJS is a fully client-side framework. AngularJS's templating is based on bidirectional UI data binding. Data-binding is an automatic way of updating the view whenever the model changes, as well as updating the model whenever the view changes. The HTML template is compiled in the browser. The compilation step creates pure HTML, which the browser re-renders into the live view. The step is repeated for subsequent page views. In traditional server-side HTML programming, concepts such as controller and model interact within a server process to produce new HTML views. In the AngularJS framework, the controller and model states are maintained within the client browser. Therefore, new pages are capable of being generated without any interaction with a server. Angular 2+ is a SPA Framework developed by Google after AngularJS. It is several steps ahead of Angular and there is a strong community of developers using
https://en.wikipedia.org/wiki/Sh%C5%8Deisha
Shōeisha Co., Ltd., sometimes abbreviated SE, is a publisher specializing in computer and software books. They have more than 1,000 publications, including programming books and application tutorials. Formerly, Shōeisha produced video games for various consoles, including the PlayStation, Dreamcast, and Sega Saturn. Twenty-three such titles were released 1995 through 2001. Video game releases References Shoeisha Co., Ltd. Homepage IGN Profile Plasticbad.de Game Releases by Year Amusement companies of Japan Video game companies established in 1986 Publishing companies established in 1986 Book publishing companies in Tokyo Software companies based in Tokyo Video game companies of Japan Video game publishers Video game development companies Japanese companies established in 1986
https://en.wikipedia.org/wiki/Borealaspis
Borealaspis is an extinct genus of Trilobite. It contains two species, B. biformis, and B. whittakerensis. External links Borealaspis at the Paleobiology Database Ordovician trilobites of North America Paleozoic life of the Northwest Territories Paleozoic life of Quebec Cheiruridae Phacopida genera
https://en.wikipedia.org/wiki/SIGMOD%20Edgar%20F.%20Codd%20Innovations%20Award
The ACM SIGMOD Edgar F. Codd Innovations Award is a lifetime research achievement award given by the ACM Special Interest Group on Management of Data, at its yearly flagship conference (also called SIGMOD). According to its homepage, it is given "for innovative and highly significant contributions of enduring value to the development, understanding, or use of database systems and databases". The award has been given since 1992. Recipients See also List of computer science awards References Awards of the Association for Computing Machinery Awards established in 1992 Computer science awards Data management
https://en.wikipedia.org/wiki/Calymenidius
Calymenidius is an extinct genus of trilobites. References External links Calymenidius at the Paleobiology Database Fossils of Canada Ptychopariida genera Ptychoparioidea Paleozoic life of Newfoundland and Labrador Paleozoic life of Yukon
https://en.wikipedia.org/wiki/David%20Maier
David Maier (born 2 June 1953) is the Maseeh Professor of Emerging Technologies in the Department of Computer Science at Portland State University. Born in Eugene, OR, he has also been a computer science faculty member at the State University of New York at Stony Brook (1978–82), Oregon Graduate Center (OGC, 1982–2001), University of Wisconsin (UW, 1997–98), Oregon Health & Science University (2001–present) and National University of Singapore (2012–15). He holds a B.A. in Mathematics and Computer Science from the University of Oregon (Honors College, 1974) and a Ph.D. in Electrical Engineering and Computer Science from Princeton University (1978). Maier has been chairman of the program committee of ACM SIGMOD. He also served as an associate editor of ACM Transactions on Database Systems. Maier has consulted with Tektronix, Inc., Servio Corporation, the Microelectronics and Computer Technology Corporation (MCC), Digital Equipment Corporation, Altair Engineering, Honeywell, Texas Instruments, IBM, Microsoft, Informix, Oracle Corporation, NCR, and Object Design, as well as several governmental agencies. He is a founding member of the Data-Intensive Systems Center (DISC), a joint project of OGI and Portland State University. He is the author of books on relational databases, logic programming and object-oriented databases, as well as papers in database theory, object-oriented technology and scientific databases. He received the Presidential Young Investigator Award from the National Science Foundation in 1984 at OGC, and was awarded the 1997 SIGMOD Edgar F. Codd Innovations Award for his contributions in objects and databases at UW. He is also an ACM Fellow. Maier established some of the earliest results on using the relational model. Together with his thesis advisor, Jeffrey Ullman, and fellow Princeton students, including Alberto O. Mendelzon and Yehoshua Sagiv, he co-authored a number of influential papers that laid out the fundamental issues and approaches for relational databases. In a now-famous paper (Maier, Mendelzon and Sagiv, ACM Trans. Database Syst. 1979), he introduced the chase, a method for testing implication of data dependencies that is now of widespread use in the database theory literature. This work has been highly influential: it is used, directly or indirectly, on an everyday basis by people who design databases, and it is used in commercial systems to reason about the consistency and correctness of a data design. New applications of the chase in meta-data management and data exchange are still being discovered. He is credited for coining the term Datalog. References David Maier's homepage: http://web.cecs.pdx.edu/~maier/ His database theory book, now available online: http://web.cecs.pdx.edu/~maier/TheoryBook/TRD.html American computer scientists Database researchers Fellows of the Association for Computing Machinery Portland State University faculty Living people Oregon Graduate Institute people 1953 births
https://en.wikipedia.org/wiki/Maharishi%20Shiv%20Brat%20Lal
Shiv Brat Lal Verman, (1860-1939) popularly known by the honorifics "Data Dayal" (Merciful) and "Maharishi" (Great Sage), was born in Bhadohi district of Uttar Pradesh state in India in February 1860. He was a post graduate and a famous writer. It is believed that he wrote as many as 3,000 books on various social, historical, religious and spiritual topics. Being a famous writer he was called as the modern Maharishi Ved Vyas and hence became famous with the name Maharishi ji. Writings As an editor he moved to Lahore to edit the 'Arya Gazette' - an Urdu weekly. On 1 August 1907 he started his own magazine, Sadhu, and it acquired popularity very quickly. He became a famous writer and in his lifetime he edited and authored almost 3000 spiritual periodicals and books in Hindi, Urdu & English on various social, historical, religious and spiritual topics. His books Light on Anand Yoga, Dayal Yoga and Shabd Yoga became very famous. He left the body on February 23, 1939. Maharishi's books on the Radha Soami spiritual movement include: Light on Anand Yoga (English) Dayal Yoga Shabd Yoga Radhaswami Yog: Part 1-6 Radhaswami Mat Parkash Adbhut Upasana Yog: Part 1-2 Anmol Vichar Dus Avtaron Ki Katha Kabir Prichaya Adyagyan Kabir Yog: Part 1-13 Kabir Bijak: Part 1-3 Karam Rahshya Nanak Yog: Part 1-3 Panth Sandesh Safalta Ke Sadhan Sahaj Yog Saptrishi Vartant Sharanangati Yog Satsang Ke Aath Vachan Vayvahar Gyan Parkash Vicharanjali Vigyan Ramayana (Urdu) Vigyan Krishnayana (Urdu) Missionary To spread the Radha Soami spiritual movement, Maharishi began a long journey from Lahore to Calcutta on 2 August 1911. He then left Calcutta, proceeding towards Rangoon by sea. He reached Penang on 31 October and Hong Kong on 22 November, via Singapore and Java. After that he went to Japan and later he went to San Francisco in America, where he delivered two lectures. Ashram In 1912 Maharishi founded his ashram in Gopi Ganj in Mirzapur, Uttar Pradesh, India. His discourses attracted seekers of the Radha Soami movement from all over the India and abroad. He left for the "Radha Swami Dham" on 23 February 1939 at the age of seventy-nine. His holy Samādhi stands at Radha Swami Dham, near Gopi Ganj. Among those who continued his work was Baba Faqir Chand of Hoshiarpur and Param Sant Ram Singh Ji Arman of Jui, Haryana. See also Bhagat Munshi Ram Baba Faqir Chand Manav Dayal I.C.Sharma Manavta Mandir Shiv Dayal Singh Rai Saligram External links Manavta Mandir, Hoshiarpur Baba Faqir Chand Website References Sant Mat gurus Surat Shabd Yoga Spiritual teachers 1939 deaths 1860 births People from Uttar Pradesh
https://en.wikipedia.org/wiki/Third%20Sector%20Foundation%20of%20Turkey
Third Sector Foundation of Turkey (TUSEV) was established in 1993 by Turkey’s leading civil society organisations (CSOs), and has now grown to a supporting network of over 100 associations and foundations that share a vision of strengthening the legal, fiscal and operational infrastructure of the third (non-profit) sector in Turkey. TUSEV seeks to promote a legally and fiscally enabling environment for nonprofit organizations in Turkey, encourage strategic and effective giving, facilitate partnerships across the public, private & third sectors, support and engage the international community in learning about and collaborating with the Turkish third sector and conduct research on the sector's role, needs and dynamics to serve as a basis for civil society strengthening initiatives. TUSEV is a member of the European Foundation Centre, CIVICUS, International Society for Third-Sector Research and WINGS. TUSEV has four programme areas. Civil Society Law Reform: This program has been TUSEV's core competency since its establishment in 1993. Over the years, the program has expanded significantly in line with the increased mandate for this focus in the sector. The key objective is to promote an enabling environment for CSOs in Turkey by acting as the key source of information and updates on legal and fiscal issues for the Turkish third sector, promoting mechanisms to increase CSOs participation in the policy making process and CSO-government cooperation, conducting independent policy analysis and advocating for reform, analyzing and monitoring of reform implementation and supporting implementation/capacity building for CSOs and governments in adapting to new legislation and processes. Social Investment: TUSEV seeks to inform stakeholders (existing and potential donors) about strategic and effective practices, help create a more enabling infrastructure for social investment and philanthropy in Turkey, introduce and support the establishment of new mechanisms that enable the flow of resources to CSOs, such as community foundations and advise new donors and foundations on creating effective giving strategies. International Relations and Networking: TUSEV, through its International Relations and Networking seeks to create common platforms to exchange best practices and ideas and facilitate cooperation between Turkish civil society organizations, their international counterparts and donors. Research and Publications:: TUSEV aims to undertake critical research initiatives on issues regarding the third sector and generate useful data and reports that will help to inform practitioners and promote dialogue among all stakeholders. References External links TUSEV Website Civil Society Index Project in Turkey Website Organizations established in 1993 Foundations based in Turkey
https://en.wikipedia.org/wiki/Smart%20Eye
Smart Eye AB, is a Swedish artificial intelligence (AI) company founded in 1999 and headquartered in Gothenburg, Sweden. Smart Eye develops Human Insight AI, technology that understands, supports and predicts human behavior in complex environments. Smart Eye develops and deploys several core technologies that help gain insights from subtle and nuanced changes in human behavior, reactions and expressions. These technologies include head tracking, eye tracking, facial expression analysis and Emotion AI, activity and object detection, and multimodal sensor data analysis.   In 2021, Smart Eye acquired Affectiva and iMotions. The company sells into two main business areas: Automotive and Behavioral Research. Smart Eye's solutions are sold directly and through resellers and partners worldwide. Automotive Smart Eye sells its technology to the automotive industry, where its driver monitoring systems and interior sensing software is integrated into new vehicles or in fleets for aftermarket installation. Driver Monitoring System (DMS) Smart Eye provides automotive OEMs and Tier 1 suppliers with road-ready driver monitoring software that can be embedded in new vehicles that are produced.   The company's AI-based software uses in-car cameras to analyze eye gaze, head movement, body posture, activities and objects to determine dangerous driving behavior such as distraction and drowsiness. Smart Eye's algorithms are developed using computer vision, deep learning and large amounts of data that Smart Eye collects and annotates. The company augments these data sets with synthetic data. Smart Eye's algorithms are hardware agnostic and support a wide range of cameras and Systems on Chip (SoC), from the low to the very high-end. Smart Eye's DMS does not store video of the driver. In Europe, Driver Monitoring Systems are becoming mandatory automotive safety technology, due to legislation, regulation and ratings agencies.  The EU General Safety Regulation (GSR) has adopted ADDW (Advanced Driver Distraction Warning) which will require direct monitoring of the driver. This legislation will apply to all new type registrations from July 2024 and all new vehicle registrations from July 20261. And the European New Car Assessment Programme (Euro NCAP) is now requiring driver monitoring systems for 5-star ratings. In September 2022 Smart Eye announced that its DMS is already deployed in more than 1 million cars on the road. At CES in January 2023, Smart Eye exhibited a Polestar 3 with Smart Eye DMS in its booth. As of April 2023, the company has also secured 217 design wins from more than 19 global car manufacturers (OEMs), including BMW, Polestar and Geely. On June 20, 2023, Smart Eye revealed new metrics that remotely monitor heart and respiration rates as indicators of physical well-being. Interior Sensing Smart Eye also sells Interior Sensing software to the automotive industry. Interior Sensing combines driver monitoring with cabin and occupant monitorin
https://en.wikipedia.org/wiki/Principal%20geodesic%20analysis
In geometric data analysis and statistical shape analysis, principal geodesic analysis is a generalization of principal component analysis to a non-Euclidean, non-linear setting of manifolds suitable for use with shape descriptors such as medial representations. References Principal Geodesic Analysis for the Study of Nonlinear Statistics of Shape Probabilistic Principal Geodesic Analysis Kernel Principal Geodesic Analysis Mixture Probabilistic Principal Geodesic Analysis Image processing Digital geometry Differential geometry Topology Factor analysis
https://en.wikipedia.org/wiki/Everything2
Everything2 (styled Everything2 or E2 for short) is a collaborative online community consisting of a database of interlinked user-submitted written material. E2 is moderated for quality, but has no formal policy on subject matter. Writing on E2 covers a wide range of topics and genres, including encyclopedic articles, diary entries (known as "daylogs"), poetry, humor, and fiction. History The predecessor of E2 was a similar database called Everything (later labeled "Everything1" or "E1") which was started around March 1998 by Nathan Oostendorp and was initially closely aligned with and promoted by the technology-related news website Slashdot (by virtue of various key principals having attended the Holland Christian High School), even sharing (at the time) some administrators. The Everything2 software offered vastly more features, and the Everything1 data was twice incorporated into E2: once on November 13, 1999, and again in January 2000. The Everything2 server used to be colocated with the Slashdot servers. However, some time after OSDN acquired Slashdot, and moved the Slashdot servers, this hosting was terminated on short notice. This resulted in Everything2 being offline from roughly November 6 to December 9, 2003. Everything2 was then hosted by the University of Michigan for a time. As the Everything2 site put it on October 2, 2006: Now, we have an arrangement with the University of Michigan, located in Ann Arbor. We exist thanks to their generosity (which is motivated by their academic curiosity, I suppose). They gave us some servers and act as our ISP, free of charge, and all they ask in exchange is that we not display advertisements. The Everything2 servers were moved to the nearby Michigan State University in February 2007. E2 was privately owned by the Blockstackers Intergalactic company, but does not make a profit and is viewed by its long-term users as a collaborative work-in-progress. Until mid-2007 it accepted donations of money and, on occasion, of computer hardware but no longer does so. Some of its administrators are affiliated with Blockstackers, some are not. The site is not a democracy, and the degree to which users influence decisions depends on the nature of the decisions and the administrators making them. As of January 23, 2012, it was announced that the site had been sold to long-time user and coder Jay Bonci under the name Everything2 Media LLC. Writeups in E1 were limited to 512 bytes in size. This, plus the predominantly "geek" membership back then and the lack of chat facilities, meant the early work was often of poor quality and was filled with self-referential humor. As E2 has expanded, stricter quality standards have developed, much of the old material has been removed, and the membership has become broader in interest, although smaller in number. Many noders prefer to write encyclopedic articles similar to those on Wikipedia (and indeed some actively contribute to both E2 and Wikipedia). Some write fiction o
https://en.wikipedia.org/wiki/Berkeley%20Software%20Distribution
The Berkeley Software Distribution or Berkeley Standard Distribution (BSD) is a discontinued operating system based on Research Unix, developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berkeley. The term "BSD" commonly refers to its open-source descendants, including FreeBSD, OpenBSD, NetBSD, and DragonFly BSD. BSD was initially called Berkeley Unix because it was based on the source code of the original Unix developed at Bell Labs. In the 1980s, BSD was widely adopted by workstation vendors in the form of proprietary Unix variants such as DEC Ultrix and Sun Microsystems SunOS due to its permissive licensing and familiarity to many technology company founders and engineers. Although these proprietary BSD derivatives were largely superseded in the 1990s by UNIX SVR4 and OSF/1, later releases provided the basis for several open-source operating systems including FreeBSD, OpenBSD, NetBSD, DragonFly BSD, Darwin and TrueOS. These, in turn, have been used by proprietary operating systems, including Apple's macOS and iOS, which derived from them and Microsoft Windows, which used (at least) part of its TCP/IP code, which was legal. Code from FreeBSD was also used to create the operating system for the PlayStation 5, PlayStation 4, PlayStation 3, PlayStation Vita, and Nintendo Switch. History The earliest distributions of Unix from Bell Labs in the 1970s included the source code to the operating system, allowing researchers at universities to modify and extend Unix. The operating system arrived at Berkeley in 1974, at the request of computer science professor Bob Fabry who had been on the program committee for the Symposium on Operating Systems Principles where Unix was first presented. A PDP-11/45 was bought to run the system, but for budgetary reasons, this machine was shared with the mathematics and statistics groups at Berkeley, who used RSTS, so that Unix only ran on the machine eight hours per day (sometimes during the day, sometimes during the night). A larger PDP-11/70 was installed at Berkeley the following year, using money from the Ingres database project. Understanding BSD requires delving far back into the history of Unix, the operating system first released by AT&T Bell Labs in 1969. BSD began life as a variant of Unix that programmers at the University of California at Berkeley, initially led by Bill Joy, began developing in the late 1970s. At first, BSD was not a clone of Unix, or even a substantially different version of it. It just included some extra features, which were intertwined with code owned by AT&T. In 1975, Ken Thompson took a sabbatical from Bell Labs and came to Berkeley as a visiting professor. He helped to install Version 6 Unix and started working on a Pascal implementation for the system. Graduate students Chuck Haley and Bill Joy improved Thompson's Pascal and implemented an improved text editor, ex. Other universities became interested in the software at Berkel
https://en.wikipedia.org/wiki/Battle.net
Battle.net is an Internet-based online game, social networking service, digital distribution, and digital rights management platform developed by Blizzard Entertainment. The service was launched on December 31, 1996, followed a few days later with the release of Blizzard's action-role-playing video game Diablo on January 3, 1997. Battle.net was officially renamed to "Blizzard Battle.net" in August 2017, with the change being reverted in January 2021. Battle.net was the first online gaming service incorporated directly into the games that make use of it, in contrast to the external interfaces used by the other online services at the time. This feature, along with ease of account creations and the absence of member fees, caused Battle.net to become popular among gamers and became a major selling point for Diablo and subsequent Blizzard games. Since the successful launch of Battle.net, many companies have created online game services mimicking Blizzard's service package and the user interface. Blizzard Entertainment officially unveiled the revamped Battle.net 2.0 on March 20, 2009. It later revealed further details of the Battle.net revamped features at BlizzCon 2009 which supported World of Warcraft, StarCraft II, and Diablo III. The original Battle.net was then renamed to Battle.net Classic. Battle.net Classic games use a different account system to the games on Battle.net 2.0. The platform currently supports storefront actions, social interactions, and matchmaking for all of Blizzard's modern PC games including Hearthstone, Heroes of the Storm, Overwatch 2, and StarCraft: Remastered, as well as various Call of Duty games, and Crash Bandicoot 4: It's About Time from corporate sibling of Blizzard Entertainment, Activision. The platform provides cross-game instant messaging and voice chat service. In September 2017, Blizzard Entertainment released the Battle.net application for Android and iOS. The app includes the ability to chat with and add friends in addition to seeing what games they are currently playing. History Battle.net Classic (1996–2009) When the service initially launched on December 31, 1996 (the first game using the service being Diablo releasing a few days later on January 3, 1997), Battle.net offered only a few basic services like chatting and game listings. Players could connect to the service, talk with other gamers and join multiplayer games of Diablo. Besides user account data, no game data was stored on the Battle.net servers. When a player connected to a game, they would be connecting directly to the other players in the game. No data was sent through the Battle.net servers. While this made the service quick and easy to use, it quickly led to widespread cheating since players using cheats could modify their game data locally. However, since there was an option to create private games, many players ended up playing with people they knew. The release of StarCraft in 1998 increased usage of the Battle.net service signifi
https://en.wikipedia.org/wiki/AmigaOS
AmigaOS is a family of proprietary native operating systems of the Amiga and AmigaOne personal computers. It was developed first by Commodore International and introduced with the launch of the first Amiga, the Amiga 1000, in 1985. Early versions of AmigaOS required the Motorola 68000 series of 16-bit and 32-bit microprocessors. Later versions were developed by Haage & Partner (AmigaOS 3.5 and 3.9) and then Hyperion Entertainment (AmigaOS 4.0-4.1). A PowerPC microprocessor is required for the most recent release, AmigaOS 4. AmigaOS is a single-user operating system based on a preemptive multitasking kernel, called Exec. It includes an abstraction of the Amiga's hardware, a disk operating system called AmigaDOS, a windowing system API called Intuition, and a desktop environment and file manager called Workbench. The Amiga intellectual property is fragmented between Amiga Inc., Cloanto, and Hyperion Entertainment. The copyrights for works created up to 1993 are owned by Cloanto. In 2001, Amiga Inc. contracted AmigaOS 4 development to Hyperion Entertainment, and in 2009 they granted Hyperion an exclusive, perpetual, worldwide license to AmigaOS 3.1 in order to develop and market AmigaOS 4 and subsequent versions. On December 29, 2015, the AmigaOS 3.1 source code leaked to the web; this was confirmed by the licensee, Hyperion Entertainment. Components AmigaOS is a single-user operating system based on a preemptive multitasking kernel, called Exec. AmigaOS provides an abstraction of the Amiga's hardware, a disk operating system called AmigaDOS, a windowing system API called Intuition and a desktop file manager called Workbench. A command-line interface (CLI), called AmigaShell, is also integrated into the system, though it also is entirely window-based. The CLI and Workbench components share the same privileges. Notably, AmigaOS lacks any built-in memory protection. AmigaOS is formed from two parts, namely, a firmware component called Kickstart and a software portion usually referred to as Workbench. Up until AmigaOS 3.1, matching versions of Kickstart and Workbench were typically released together. However, since AmigaOS 3.5, the first release after Commodore's demise, only the software component has been updated and the role of Kickstart has been diminished somewhat. Firmware updates may still be applied by patching at system boot. That was until 2018 when Hyperion Entertainment (license holder to AmigaOS 3.1) released AmigaOS 3.1.4 with an updated Kickstart ROM to go with it. Firmware and bootloader Kickstart is the bootstrap firmware, usually stored in ROM. Kickstart contains the code needed to boot standard Amiga hardware and many of the core components of AmigaOS. The function of Kickstart is comparable to the BIOS plus the main operating system kernel in IBM PC compatibles. However, Kickstart provides more functionality available at boot time than would typically be expected on PC, for example, the full windowing environment. Kicksta
https://en.wikipedia.org/wiki/HavenCo
HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a self-declared unrecognized principality that occupied Roughs Tower. In November 2008, operations of HavenCo ceased without explanation. Founding On 22 August 2000, Michael Bates of Leigh-on-sea, Essex- also known as Prince Michael of Sealand- bought a dormant British company which was renamed HavenCo Limited. It was given the registration number of 04056934 by Companies House, an executive agency of the UK Department of Trade and Industry. The registered office of HavenCo Limited was recorded at 11 Kintyre House, Cold Harbour, London, E14 9NL England. The directors were listed as Michael Roy Bates, a citizen of the United Kingdom, who was named Chief Operating Officer, and Ryan Donald Lackey, a US citizen. Other founders included Sean Hastings, Jo Hastings, Avi Freedman, and Sameer Parekh was an advisor to the company. The company later relocated its registration to Cyprus. HavenCo initially received broad coverage in the international media, appearing on the cover of Wired Magazine, in over 200 press articles, and in several television reports. In these reports, HavenCo claimed to have established a secure colocation facility on Sealand, and that it had commenced operations as a data haven. Detractors claim that these reports gave the impression that HavenCo was registered on Sealand itself, and that the company would issue domain names under the authority of that entity, whereas it had no entitlement to do so. Services The company announced that it had become operational in December 2000 and that its Acceptable Use Policy prohibited child pornography, spamming, and malicious hacking, but that all other content was acceptable. It claimed that it had no restrictions on copyright or intellectual property for data hosted on its servers, arguing that as Sealand was not a member of the World Trade Organization or WIPO, international intellectual property law did not apply. Other services available from HavenCo at the time included IT consulting, systems administration, offshore software development, and electronic mail services. Later policies specified, "No pornography that would be considered illegal within the EU," and "No infringement of copyright." Ryan Lackey left HavenCo under acrimonious circumstances in 2002, citing disagreements with the Bates family over management of the company. The HavenCo website went offline in 2008. In 2013, Freedman announced plans for HavenCo to resume operation: offering proxies, VPNs, and other services using servers in the European Union and the United States, while storing encryption keys and other cold data in Sealand. References External links Sealand, HavenCo, and the Rule of Law, James Grimmelmann, March 2012, University of Illinois Law Review, Volume 2012, Number 2 "Has 'haven' for questionable sites sunk?" - A News.com article from August 4, 2003 Video - From The Daily Show with Jon St
https://en.wikipedia.org/wiki/File%20format
A file format is a standard way that information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free. Some file formats are designed for very particular types of data: PNG files, for example, store bitmapped images using lossless data compression. Other file formats, however, are designed for storage of several different types of data: the Ogg format can act as a container for different types of multimedia including any combination of audio and video, with or without text (such as subtitles), and metadata. A text file can contain any stream of characters, including possible control characters, and is encoded in one of various character encoding schemes. Some file formats, such as HTML, scalable vector graphics, and the source code of computer software are text files with defined syntaxes that allow them to be used for specific purposes. Specifications File formats often have a published specification describing the encoding method and enabling testing of program intended functionality. Not all formats have freely available specification documents, partly because some developers view their specification documents as trade secrets, and partly because other developers never author a formal specification document, letting precedent set by other already existing programs that use the format define the format via how these existing programs use it. If the developer of a format does not publish free specifications, another developer looking to utilize that kind of file must either reverse engineer the file to find out how to read it or acquire the specification document from the format's developers for a fee and by signing a non-disclosure agreement. The latter approach is possible only when a formal specification document exists. Both strategies require significant time, money, or both; therefore, file formats with publicly available specifications tend to be supported by more programs. Patents Patent law, rather than copyright, is more often used to protect a file format. Although patents for file formats are not directly permitted under US law, some formats encode data using patented algorithms. For example, prior to 2004, using compression with the GIF file format required the use of a patented algorithm, and though the patent owner did not initially enforce their patent, they later began collecting royalty fees. This has resulted in a significant decrease in the use of GIFs, and is partly responsible for the development of the alternative PNG format. However, the GIF patent expired in the US in mid-2003, and worldwide in mid-2004. Identifying file type Different operating systems have traditionally taken different approaches to determining a particular file's format, with each approach having its own advantages and disadvantages. Most modern operating systems and individual applications need to use all of the following app
https://en.wikipedia.org/wiki/Metadata
Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: Descriptive metadata – the descriptive information about a resource. It is used for discovery and identification. It includes elements such as title, abstract, author, and keywords. Structural metadata – metadata about containers of data and indicates how compound objects are put together, for example, how pages are ordered to form chapters. It describes the types, versions, relationships, and other characteristics of digital materials. Administrative metadata – the information to help manage a resource, like resource type, permissions, and when and how it was created. Reference metadata – the information about the contents and quality of statistical data. Statistical metadata – also called process data, may describe processes that collect, process, or produce statistical data. Legal metadata – provides information about the creator, copyright holder, and public licensing, if provided. Metadata is not strictly bound to one of these categories, as it can describe a piece of data in many other ways. History Metadata has various purposes. It can help users find relevant information and discover resources. It can also help organize electronic resources, provide digital identification, and archive and preserve resources. Metadata allows users to access resources by "allowing resources to be found by relevant criteria, identifying resources, bringing similar resources together, distinguishing dissimilar resources, and giving location information". Metadata of telecommunication activities including Internet traffic is very widely collected by various national governmental organizations. This data is used for the purposes of traffic analysis and can be used for mass surveillance. Metadata was traditionally used in the card catalogs of libraries until the 1980s when libraries converted their catalog data to digital databases. In the 2000s, as data and information were increasingly stored digitally, this digital data was described using metadata standards. The first description of "meta data" for computer systems is purportedly noted by MIT's Center for International Studies experts David Griffel and Stuart McIntosh in 1967: "In summary then, we have statements in an object language about subject descriptions of data and token codes for the data. We also have statements in a meta language describing the data relationships and transformations, and ought/is relations between norm and data." Unique metadata standards exist for different disciplines (e.g., museum collections, digital audio files, websites, etc.). Describing the contents and context of data or data files increases its usefulness. For example, a web page may include metadata specifying what software language the page is written in (e.g., HTML), what tools wer
https://en.wikipedia.org/wiki/Compatibility%20card
A compatibility card is an expansion card for computers that allows it to have hardware emulation with another device. While compatibility cards date back at least to the Apple II family, the majority of them were made for 16-bit computers, often to maintain compatibility with the IBM PC. The most popular of these were for Macintosh systems that allowed them to emulate Windows PCs via NuBus or PCI; Apple had released several such cards themselves. Compatibility cards by system Apple II The Z-80 SoftCard made the Apple II and Apple II Plus compatible with CP/M by way of a Zilog Z80 processor, and was followed up by the Premium SoftCard IIe for the Apple IIe. IBM PC compatibles 3DO Blaster Macintosh By Apple Apple IIe Card for the Macintosh LC family Houdini I PDS card for Macintosh Quadra with a 25 MHz 486 CPU DOS Compatibility card for Power Macintosh 6100 with a 486/66 CPU (actually a Quadra PDS card with a special adapter; if the adapter is removed, the card can be used in a Quadra) 7-inch PCI PC Compatibility card with 5x86/100 MHz CPU 12-inch PCI PC Compatibility card with Intel Pentium 100MHz CPU, Intel Pentium 166MHz CPU, or Cyrix 6x86 133MHz CPU (166PR) for Power Macintosh 7200, 7300, Power Macintosh 4400 and 7220 By other manufacturers Dayna Communications released the MacCharlie for the Macintosh 128K and 512K AST Research released the Mac86 as a PDS expansion for the Macintosh SE, giving it DOS compatibility through a 10 MHz 8086 processor. It was followed up by the Mac286, which added a 286 processor through the Macintosh II's NuBus slots. After AST left the Mac market, the rights to both were sold to Orange Micro. Orange Micro's OrangePC series of cards were the spiritual successor to the Mac86 and Mac286. These cards provided support for 386, 486, and Pentium processors, up to a 400 MHz AMD K6-2 processor in the final model. Orange Micro also released the PCfx!, a cut down OrangePC board with a 200 MHz Pentium soldered on. Reply Corporation's DOS on Mac series of cards added a 486/5x86 (up to 100 MHz) processor and DOS compatibility to Centris, Quadra, Performa, and Power Macintoshes through a PDS expansion; later models supported PCI-based Power Macs and Pentium processors up to 200 MHz. This technology was acquired by Radius in 1997, who began selling the cards under the name "Detente." Amiga Amiga Sidecar for the Amiga 1000 Archimedes In 1992, the company Aleph One released the 386PC, an expansion that added a 20 MHz 386SX processor to the Archimedes for running DOS applications. Licensed versions of these cards were soon made by Acorn for the A3020 and A4000; these official cards were available with both 386SX and 486SLC processors. An updated DOS compatibility card with a 40 MHz 486SX (underclocked to 33 MHz) was available as an upgrade for the Archimedes' successor, the Risc PC. Notes References Compatibility cards Interoperability
https://en.wikipedia.org/wiki/Latitude%20ON
Latitude ON is an instant-on computer system made by Dell. It is a combination of software and hardware developed by Dell and used in some of their Latitude laptops. The system is based on a dedicated ARM processor (Texas Instruments OMAP 3430) that runs a custom version of a Linux OS. It was announced on August 12, 2008, along with other laptops, including a potential competitor to the Asus Eee PC and arrived a year later on 28 September 2009. Latitude ON runs MontaVista Linux on an ARM-based subprocessor. This so-called MontaVista Montabello Mobile Internet Device Solution provides a customizable, Linux-based Mobile Internet Device (MID) platform the laptop is able to boot almost instantly and view Email, document reader, calendar, contacts and access the Internet. First laptop models to include Latitude ON were E4200 and E4300 released in February 2009. Last laptop model introduced so far is Latitude Z600. Dell claims that battery life can be extended to days. Latitude ON Reader is similar to Dell's MediaDirect where the software is located in a separate partition on the system hard drive and has a dedicated button to power on. Versions There are several versions of Latitude ON: Dell Latitude ON | Reader - Dell's initial release of the technology. The Reader software resides on the main partition of the hard drive, boots in 15–25 seconds, uses the laptop's CPU, and provides read-only access to e-mail, calendar and contacts from the last synched version of the system's Outlook data. No Internet browser. Dell Latitude ON | FLASH - runs on a flash module, but uses the system's CPU, without significantly increased battery life. Features: boots in 8–10 seconds, supports Wi-Fi and LAN, thin client capabilities with Web access or Citrix, VMware and RDP clients, multi-protocol IM, VoIP (Skype, using the built-in webcam if present), Microsoft Office document viewer and editor (requires Internet connection), Java, Adobe Flash. Dell Latitude ON | ECM - boots in 2–3 seconds and runs on the dedicated sub-processor, with Wi-Fi or Mobile Broadband support. Includes document reader, and read/write access to e-mail, calendar and contacts, and Firefox, but without Adobe Flash or other media plugins. Supports Novell GroupWise and Cisco VPN. Long battery life (about 17 hours on a 6-cell battery). See also Splashtop HyperSpace References External links Latitude ON Comparison Chart Embedded Linux distributions Dell laptops Linux distributions
https://en.wikipedia.org/wiki/Telecommunications%20in%20Denmark
This article concerns the systems of telecommunications in Denmark. Denmark has a highly developed and efficient telephone network, and has a number of radio and television broadcast stations. Infrastructure The Denmark telecommunications network consists of buried and submarine cables and a microwave radio relay form trunk network, as well as four cellular radio communications systems. There are 18 submarine fiber-optic cables linking Denmark with Norway, Sweden, Russia, Poland, Germany, the Netherlands, United Kingdom, Faroe Islands, Iceland, and Canada. There are also a number of satellite earth stations providing an international communications link 6 Intelsat, 10 Eutelsat, 1 Orion, 1 Inmarsat (Blaavand-Atlantic-East). The Nordic countries share the Danish earth station and the Eik, Rogaland station for worldwide Inmarsat access. Telephones Denmark has an excellent telephone system network. There are 2.4 million (June 2006) main lines and 5.6 million (June 2006) mobile phones in use. Internet The country code top-level domain in Denmark is .dk. As of 2004, there were 2,666,520 internet users in Denmark and 12 ISP providers. Radio There are two AM radio broadcast stations in Denmark, 355 FM stations, and one DAB station with 17 channels as of 2005. See also Internet censorship in Denmark References
https://en.wikipedia.org/wiki/ADSL
Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. ADSL differs from the less common symmetric digital subscriber line (SDSL). In ADSL, bandwidth and bit rate are said to be asymmetric, meaning greater toward the customer premises (downstream) than the reverse (upstream). Providers usually market ADSL as an Internet access service primarily for downloading content from the Internet, but not for serving content accessed by others. Overview ADSL works by using spectrum above the band used by voice telephone calls. With a DSL filter, often called splitter, the frequency bands are isolated, permitting a single telephone line to be used for both ADSL service and telephone calls at the same time. ADSL is generally only installed for short distances from the telephone exchange (the last mile), typically less than , but has been known to exceed if the originally laid wire gauge allows for further distribution. At the telephone exchange, the line generally terminates at a digital subscriber line access multiplexer (DSLAM) where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL are typically routed over the telephone company's data network and eventually reach a conventional Internet Protocol network. There are both technical and marketing reasons why ADSL is in many places the most common type offered to home users. On the technical side, there is likely to be more crosstalk from other circuits at the DSLAM end (where the wires from many local loops are close to each other) than at the customer premises. Thus the upload signal is weakest at the noisiest part of the local loop, while the download signal is strongest at the noisiest part of the local loop. It therefore makes technical sense to have the DSLAM transmit at a higher bit rate than does the modem on the customer end. Since the typical home user in fact does prefer a higher download speed, the telephone companies chose to make a virtue out of necessity, hence ADSL. The marketing reasons for an asymmetric connection are that, firstly, most users of internet traffic will require less data to be uploaded than downloaded. For example, in normal web browsing, a user will visit a number of web sites and will need to download the data that comprises the web pages from the site, images, text, sound files etc. but they will only upload a small amount of data, as the only uploaded data is that used for the purpose of verifying the receipt of the downloaded data (in very common TCP connections) or any data inputted by the user into forms etc. This provides a justification for internet service providers to offer a more expensive service aimed at commercial users who host websites, and who therefore need a service which allows for as much data t
https://en.wikipedia.org/wiki/Ambient%20calculus
In computer science, the ambient calculus is a process calculus devised by Luca Cardelli and Andrew D. Gordon in 1998, and used to describe and theorise about concurrent systems that include mobility. Here mobility means both computation carried out on mobile devices (i.e. networks that have a dynamic topology), and mobile computation (i.e. executable code that is able to move around the network). The ambient calculus provides a unified framework for modeling both kinds of mobility. It is used to model interactions in such concurrent systems as the Internet. Since its inception, the ambient calculus has grown into a family of closely related ambient calculi. Informal description Ambients The fundamental primitive of the ambient calculus is the ambient. An ambient is informally defined as a bounded place in which computation can occur. The notion of boundaries is considered key to representing mobility, since a boundary defines a contained computational agent that can be moved in its entirety. Examples of ambients include: a web page (bounded by a file) a virtual address space (bounded by an addressing range) a Unix file system (bounded within a physical volume) a single data object (bounded by “self”) a laptop (bounded by its case and data ports) The key properties of ambients within the Ambient calculus are: Ambients have names, which are used to control access to the ambient. Ambients can be nested inside other ambients (representing, for example, administrative domains) Ambients can be moved as a whole. Operations Computation is represented as the crossing of boundaries, i.e. the movement of ambients. There are four basic operations (or capabilities) on ambients: instructs the surrounding ambient to enter some sibling ambient , and then proceed as instructs the surrounding ambient to exit its parent ambient instructs the surrounding ambient to dissolve the boundary of an ambient located at the same level makes any number of copies of something The ambient calculus provides a reduction semantics that formally defines what the results of these operations are. Communication within (i.e. local to) an ambient is anonymous and asynchronous. Output actions release names or capabilities into the surrounding ambient. Input actions capture a value from the ambient, and bind it to a variable. Non-local I/O can be represented in terms of these local communications actions by a variety of means. One approach is to use mobile “messenger” agents that carry a message from one ambient to another (using the capabilities described above). Another approach is to emulate channel-based communications by modeling a channel in terms of ambients and operations on those ambients. The three basic ambient primitives, namely in, out, and open are expressive enough to simulate name-passing channels in the π-calculus. See also Lambda calculus Mobile membranes Type theory API-Calculus References External links Mobile Computational Ambie
https://en.wikipedia.org/wiki/DrinkOrDie
DrinkOrDie (DoD) was one of the most prestigious underground software piracy group and warez trading network during the 1990s. On 11 December 2001 a major law enforcement raid - known as Operation Buccaneer - forced it to close under criminal charges of infringement. DoD, as a rule, received no financial profit for their activities. The DoD network - which primarily consisted of university undergraduates - was also supported by software company employees, who leaked copies of software and other digital media. DoD was also actively involved in illicit file-trading with other networks. History Start up and trading DrinkOrDie was founded in 1993 in Moscow by a Russian with the handle "deviator" aka "Jimmy Jamez" and a friend who went by the code name "CyberAngel." By 1995, the group was global with Jimmy Jamez as leader. In the following years, the group's founders stepped aside and were replaced by multiple council members that weren't Russians. By the end of the millennium, DrinkOrDie had leaders and council members from the United States, Australia and Israel. One of its earliest major accomplishments was the Internet release of Windows 95 two weeks before Microsoft released the official version. It is also known for its DoD DVD Speed Ripper released in 1999 shortly before DeCSS. DrinkOrDie was the biggest and most important software related group in the PC demo scene until 2001's Operation Buccaneer. Member raids In 2001 the group was busted in a U.S. Customs operation called Operation Buccaneer. The global raids were initiated after information was given to United States Customs by James Cudney, known as Bcrea8tiv. Cudney quickly rose up the ranks of DOD council where he spent many years working undercover for US Customs, logging conversations in chat rooms and channels visited on IRC. He also carried out undercover operations in the UK, France, and the US prior to the arrests collecting detailed information on DOD members and members of other online warez groups. e.g., screenames, ftp locations, nationalities. At the time, DrinkOrDie allegedly had two leaders, one in the United States and another in Australia. The warez scene reacted surprised to the bust because the Windows 95 leak was their last major release since 1995. Australia Co-leader Hew Raymond Griffiths, known by his handle "Bandido", was a British national and long-term Australian resident from Bateau Bay on the Central Coast of New South Wales. He was charged in 2003 with copyright infringement and conspiracy to commit copyright infringement under US legislation. He fought extradition to the US for over 3 years, and was arbitrarily detained by Australia for most of that time. Griffiths was ultimately unsuccessful and in early February 2007, he was extradited to the US. He pleaded guilty on 20 April 2007 to one count of conspiracy to commit criminal copyright infringement and one count of criminal copyright infringement. On 22 June 2007 Griffiths was sentenced to 51 months
https://en.wikipedia.org/wiki/Bugtraq
Bugtraq was an electronic mailing list dedicated to issues about computer security. On-topic issues are new discussions about vulnerabilities, vendor security-related announcements, methods of exploitation, and how to fix them. It was a high-volume mailing list, with as many as 776 posts in a month, and almost all new security vulnerabilities were discussed on the list in its early days. The forum provided a vehicle for anyone to disclose and discuss computer vulnerabilities, including security researchers and product vendors. While the service has not been officially terminated, and its archives are still publicly accessible, no new posts have been made since January 2021. History Bugtraq was created on November 5, 1993 by Scott Chasin in response to the perceived failings of the existing Internet security infrastructure of the time, particularly CERT. Bugtraq's policy was to publish vulnerabilities, regardless of vendor response, as part of the full disclosure movement of vulnerability disclosure. The list was sometimes spelled BugTraq, but common usage over the years called it Bugtraq. It grew to 2,500 subscribers by May 19, 1995 and over 40,000 by February, 2000. Elias Levy, known as Aleph One (alluding to the cardinal number aleph one), noted in an interview that "the environment at that time was such that vendors weren't making any patches. So the focus was on how to fix software that companies weren't fixing." Levy considered the idea of abstracting Bugtraq to be platform-specific, to reduce irrelevant information for those interested only in particular operating systems. Bugtraq was originally hosted at Crimelab.com, run by Scott Chasin. It was moved to the Brown University NetSpace Project—which has since been reorganized as the NetSpace Foundation—on June 5, 1995, the same day its moderation began. In July 1999 it became the property of SecurityFocus and was moved there. SecurityFocus was acquired in full by Symantec on August 6, 2002. As of February 25, 2020, traffic from the list stopped without explanation. In 2002, the Full-Disclosure mailing list was created because many people feeling the list had "changed for the worse". On April 30, 2020, Accenture Security completed its acquisition of Symantec's Cybersecurity Services including SecurityFocus, which included Bugtraq. Controversy Moderation The mailing list was originally unmoderated, then received only occasional moderation that many participants considered inadequate. In one incident, what appeared to be sensitive credit-card information was allowed to be posted. Subsequent posts challenged many aspects of the list, including the full disclosure of vulnerabilities, and suggested it either go unmoderated or that moderators change the way they approached it. Moderation began on June 5, 1995. Elias Levy moderated the list from June 14, 1996 until he stepped down on October 15, 2001. David Mirza Ahmad, one of the many co-authors of Hack Proofing Your Network, Second Edit
https://en.wikipedia.org/wiki/CDDB
CDDB, short for Compact Disc Database, is a database for software applications to look up audio CD (compact disc) information over the Internet. This is performed by a client which calculates a (nearly) unique disc ID and then queries the database. As a result, the client is able to display the artist name, CD title, track list and some additional information. CDDB is a licensed trademark of Gracenote, Inc. The database is used primarily by media players and CD ripper software. If a CD is not recognized by a media player or CD ripper it can be added to the database if the user fills in the names and artists etc. in a media player such as iTunes or MusicMatch Jukebox. The need for CDDB is a direct consequence of the original design of the CD, which was conceived as an evolution of the gramophone record, and did not consider the audio tracks as data files to be identified and indexed. The audio CD format does not include the disc name or track names, so a supplemental database is needed to supply this information when discs are used with modern media systems. A later development called CD-Text is another solution to the same problem. History CDDB was invented by Ti Kan around late 1993 as a local database that was delivered with his popular xmcd music player application. The application's change history first mentions the acronym CDDB in version 1.1 released on February 25, 1994. Users would submit new entries to the database via e-mail to Kan. The database quickly became unwieldy and Kan enlisted the help of Steve Scherf to create a network accessible version of the database operating as CDDB Inc. in 1995. Graham Toal supplied hosting for the CDDB server and created a banner advertising revenue model to pay for the hosting. The original software behind CDDB was released under the GNU General Public License, and many people submitted CD information thinking the service would also remain free. The project was eventually incorporated as CDDB LLC in 1998 and was soon sold by Kan, Scherf, and Toal to a high tech consumer electronics manufacturer called Escient. In a 2006 interview in Wired, Scherf claimed that Escient was the only company that would guarantee the continued development of the service by its founders, as well as protect the operation in an atmosphere where numerous companies were bidding—and in one case, attempting extortion—to acquire and immediately sell the CDDB to major players like Microsoft, which wanted a CD-recognition service but would not deal directly with CDDB Inc. In 2000, CDDB Inc. was renamed Gracenote. Early announcements asserted that access to the CDDB service would "remain 100% free to software developers and consumers". The license was nonetheless changed, and some programmers complained that the new license included certain terms that they could not accept. If one wanted to access CDDB, one was not allowed to access any other CDDB-like database such as freedb. Any programs using a CDDB lookup had to display a
https://en.wikipedia.org/wiki/Video%20game%20console%20emulator
A video game console emulator is a type of emulator that allows a computing device to emulate a video game console's hardware and play its games on the emulating platform. More often than not, emulators carry additional features that surpass limitations of the original hardware, such as broader controller compatibility, timescale control, easier access to memory modifications (like GameShark), and unlocking of gameplay features. Emulators are also a useful tool in the development process of homebrew demos and the creation of new games for older, discontinued, or rare consoles. The code and data of a game are typically supplied to the emulator by means of a ROM file (a copy of game cartridge data) or an ISO image (a copy of optical media). While emulation software itself are legal, emulating games is only so when legitimately purchasing the game physically and ripping the contents. Freely downloading or uploading game ROMs across various internet sites is considered to be a form of piracy, and users may be sued for copyright infringement. History By the mid-1990s, personal computers had progressed to the point where it was technically feasible to replicate the behavior of some of the earliest consoles entirely through software, and the first unauthorized, non-commercial console emulators began to appear. These early programs were often incomplete, only partially emulating a given system, resulting in defects. Few manufacturers published technical specifications for their hardware, which left programmers to deduce the exact workings of a console through reverse engineering. Nintendo's consoles tended to be the most commonly studied, for example the most advanced early emulators reproduced the workings of the Nintendo Entertainment System, the Super Nintendo Entertainment System, and the Game Boy. The first such recognized emulator was released around 1996, being one of the prototype projects that eventually merged into the SNES9X product. Programs like Marat Fayzullin's iNES, VirtualGameBoy, Pasofami (NES), Super Pasofami (SNES), and VSMC (SNES) were the most popular console emulators of this era. A curiosity was also Yuji Naka's unreleased NES emulator for the Genesis, possibly marking the first instance of a software emulator running on a console. Additionally, as the Internet gained wider availability, distribution of both emulator software and ROM images became more common, helping to popularize emulators. Legal attention was drawn to emulations with the release of UltraHLE, an emulator for the Nintendo 64 released in 1999 while the Nintendo 64 was still Nintendo's primary console - its next console, the GameCube, would not be released until 2001. UltraHLE was the first emulator to be released for a current console, and it was seen to have some effect on Nintendo 64 sales, though to what degree compared with diminishing sales on the aging consoles was not clear. Nintendo pursued legal action to stop the emulator project, and while the origin
https://en.wikipedia.org/wiki/Digital%20library
A digital library, also called an online library, an internet library, a digital repository, a library without walls, or a digital collection, is an online database of digital objects that can include text, still images, audio, video, digital documents, or other digital media formats or a library accessible through the internet. Objects can consist of digitized content like print or photographs, as well as originally produced digital content like word processor files or social media posts. In addition to storing content, digital libraries provide means for organizing, searching, and retrieving the content contained in the collection. Digital libraries can vary immensely in size and scope, and can be maintained by individuals or organizations. The digital content may be stored locally, or accessed remotely via computer networks. These information retrieval systems are able to exchange information with each other through interoperability and sustainability. History The early history of digital libraries is not well documented, but several key thinkers are connected to the emergence of the concept. Predecessors include Paul Otlet and Henri La Fontaine's Mundaneum, an attempt begun in 1895 to gather and systematically catalogue the world's knowledge, with the hope of bringing about world peace. The visions of the digital library were largely realized a century later during the great expansion of the Internet. Vannevar Bush and J.C.R. Licklider are two contributors that advanced this idea into then current technology. Bush had supported research that led to the bomb that was dropped on Hiroshima. After seeing the disaster, he wanted to create a machine that would show how technology can lead to understanding instead of destruction. This machine would include a desk with two screens, switches and buttons, and a keyboard. He named this the "Memex". This way individuals would be able to access stored books and files at a rapid speed. In 1956, Ford Foundation funded Licklider to analyze how libraries could be improved with technology. Almost a decade later, his book entitled "Libraries of the Future" included his vision. He wanted to create a system that would use computers and networks so human knowledge would be accessible for human needs and feedback would be automatic for machine purposes. This system contained three components, the corpus of knowledge, the question, and the answer. Licklider called it a procognitive system. Early projects centered on the creation of an electronic card catalogue known as Online Public Access Catalog (OPAC). By the 1980s, the success of these endeavors resulted in OPAC replacing the traditional card catalog in many academic, public and special libraries. This permitted libraries to undertake additional rewarding co-operative efforts to support resource sharing and expand access to library materials beyond an individual library. An early example of a digital library is the Education Resources Information Center (E
https://en.wikipedia.org/wiki/Distributed%20social%20network
A distributed social network or federated social network is an Internet social networking service that is decentralized and distributed across distinct service providers (similar to email, but for social networks), such as the Fediverse or the IndieWeb. It consists of multiple social websites, where users of each site communicate with users of any of the involved sites. From a societal perspective, one may compare this concept to that of social media being a public utility. A social website participating in a distributed social network is interoperable with the other sites involved and is in federation with them. Communication among the social websites is technically conducted over social networking protocols. Software used for distributed social networking is generally portable so it is easily adopted on various website platforms. Distributed social networks contrast with social network aggregation services, which are used to manage accounts and activities across multiple discrete social networks. A few social networking service providers have used the term more broadly to describe provider-specific services that are distributable across different websites, typically through added widgets or plug-ins. Through the add-ons, the social network functionality is implemented on users' websites. Differences between distributed and federated networks Both kind of networks are decentralized. However, distribution goes further than federation. A federated network has multiple centers, whereas a distributed network has no center at all. Comparison of software and protocols Distributed social network projects generally develop software, protocols, or both. The software is generally free and open source, and the protocols are generally open and free. Open standards such as OAuth authorization, OpenID authentication, OStatus federation, ActivityPub federation protocol, Nostr, XRD metadata discovery, the Portable Contacts protocol, the Wave Federation Protocol, the Extensible Messaging and Presence Protocol (XMPP) (aka Jabber), OpenSocial widget APIs, microformats like XFN and hCard, and Atom web feeds—increasingly referred to together as the Open Stack—are often cited as enabling technologies for distributed social networking. History The Electronic Frontier Foundation (EFF), a U.S. legal defense organization and advocacy group for civil liberties on the Internet, endorses the distributed social network model as one "that can plausibly return control and choice to the hands of the Internet user" and allow persons living under restrictive regimes to "conduct activism on social networking sites while also having a choice of services and providers that may be better equipped to protect their security and anonymity". The World Wide Web Consortium (W3C), the main international standards organization for the World Wide Web, launched a new Social Activity in July 2014 to develop standards for social web application interoperability. In 2013, the Open
https://en.wikipedia.org/wiki/Read-only%20memory
Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device. Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM. Strictly speaking, read-only memory refers to memory that is hard-wired, such as diode matrix or a mask ROM integrated circuit (IC), which cannot be electronically changed after manufacture. Although discrete circuits can be altered in principle, through the addition of bodge wires and/or the removal or replacement of components, ICs cannot. Correction of errors, or updates to the software, require new devices to be manufactured and to replace the installed device. Floating-gate ROM semiconductor memory in the form of erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM) and flash memory can be erased and re-programmed. But usually, this can only be done at relatively slow speeds, may require special equipment to achieve, and is typically only possible a certain number of times. The term "ROM" is sometimes used to refer to a ROM device containing specific software or a file with software to be stored in a writable ROM device. For example, users modifying or replacing the Android operating system describe files containing a modified or replacement operating system as "custom ROMs" after the type of storage the file used to be written to, and they may distinguish between ROM (where software and data is stored, usually Flash memory) and RAM. History Discrete-component ROM IBM used capacitor read-only storage (CROS) and transformer read-only storage (TROS) to store microcode for the smaller System/360 models, the 360/85, and the initial two System/370 models (370/155 and 370/165). On some models there was also a writeable control store (WCS) for additional diagnostics and emulation support. The Apollo Guidance Computer used core rope memory, programmed by threading wires through magnetic cores. Solid-state ROM The simplest type of solid-state ROM is as old as the semiconductor technology itself. Combinational logic gates can be joined manually to map -bit address input onto arbitrary values of -bit data output (a look-up table). With the invention of the integrated circuit came mask ROM. Mask ROM consists of a grid of word lines (the address input) and bit lines (the data output), selectively joined with transistor switches, and can represent an arbitrary look-up table with a regular physical layout and predictable propagation delay. Mask ROM is programmed with photomasks in photolithography during semiconductor manufacturing. The mask defines physical features or structures that will be removed, or added in the ROM chips, and the presence or ab
https://en.wikipedia.org/wiki/Uniform%20Computer%20Information%20Transactions%20Act
Uniform Computer Information Transactions Act (UCITA) was an attempt to introduce a Uniform Act for the United States to follow. As a model law, it only specifies a set of guidelines, and each of the States should decide if to pass it or not, separately. UCITA has been drafted by National Conference of Commissioners on Uniform State Laws (NCCUSL). UCITA has been designed to clarify issues which were not addressed by existing Uniform Commercial Code. "Few disagree that the current Uniform Commercial Code is ill-suited for use with licensing and other intangible transactions", said practicing attorney Alan Fisch. UCITA has only been passed in two states, Virginia and Maryland. The law did not pass in other states. Nevertheless, legal scholars, such as noted commercial law professor Jean Braucher, believe that the UCITA offers academic value. A resolution recommending approval of UCITA by the American Bar Association (ABA) has been withdrawn by the NCCUSL in 2003, indicating that UCITA lacks the consensus which is necessary for it to become a uniform act. UCITA has faced significant opposition from various groups. Provisions UCITA focuses on adapting current commercial trade laws to the modern software era. It is particularly controversial in terms of computer software. The code would automatically make a software maker liable for defects and errors in the program. However, it allows a shrinkwrap license to override any of UCITA's provisions. As a result, commercial software makers can include such a license in the box and not be liable for errors in the software. Free software that is distributed gratis and through downloads, however, would not be able to force a shrinkwrap license and would therefore be liable for errors. Small software makers without legal knowledge would also be at risk. UCITA would explicitly allow software makers to make any legal restrictions they want on their software by calling the software a license in the EULA, rather than a sale. This would therefore take away purchasers right to resell used software under the first sale doctrine. Without UCITA, courts have often ruled that despite the EULA claiming a license, the actual actions by the software company and purchaser clearly shows it was a purchase, meaning that the purchaser has the right to resell the software to anyone. History UCITA started as an attempt to modify the Uniform Commercial Code by introducing a new article: Article 2B (also known as UCC2B) on Licenses. The committee for drafting UCC2B consisted of members from both the NCCUSL and the American Law Institute (ALI). At a certain stage of the process, ALI withdrew from the drafting process, effectively killing UCC2B. Afterwards, the NCCUSL renamed UCC2B into UCITA and proceeded on its own. Passage record Before ratification, each state may amend its practices, thus creating different conditions in each state. This means that the final "as read" UCITA document is what is actually passed and signed int
https://en.wikipedia.org/wiki/Code%20and%20Other%20Laws%20of%20Cyberspace
Code and Other Laws of Cyberspace is a 1999 book by Lawrence Lessig on the structure and nature of regulation of the Internet. Summary The primary idea of the book, as expressed in the title, is the notion that computer code (or "West Coast Code", referring to Silicon Valley) regulates conduct in much the same way that legal code (or "East Coast Code", referring to Washington, D.C.) does. More generally, Lessig argues that there are actually four major regulators (Law, Norms, Market, Architecture) each of which has a profound impact on society and whose implications must be considered (sometimes called the "pathetic dot theory", after the "dot" that is constrained by these regulators.) The book includes a discussion of the implications for copyright law, arguing that cyberspace changes not only the technology of copying but also the power of law to protect against illegal copying. It goes so far as to argue that code displaces the balance in copyright law and doctrines such as fair use. If it becomes possible to license every aspect of use (by means of trusted systems created by code), no aspect of use would have the protection of fair use. The importance of this side of the story is generally underestimated and, as the examples in the book show, very often, code is even (only) considered as an extra tool to fight against "unlimited copying." Other books The Future of Ideas is a continuation of Code's analysis of copyright, where Lessig argues that too much long term copyright protection hampers the creation of new ideas based on existing works, and advocates the importance of existing works entering the public domain quickly. Revision In March 2005, Lessig launched the Code V.2 Wiki to update the book with current information, which he then adapted into a second edition of the book, Code: Version 2.0, in 2006. Influence The book has been widely cited, and Lessig has repeatedly achieved top places on lists of most-cited law school faculty. It has been called "the most influential book to date about law and cyberspace", "seminal", and in a critical essay on the book's 10th anniversary, author Declan McCullagh (subject of the chapter "What Declan Doesn't Get") said it was "difficult to overstate the influence" of the book. See also Cyberspace Digital rights management Government by algorithm Information society Free Culture Internet and Technology Law Desk Reference References 1999 non-fiction books Books about the Internet Works about intellectual property law Copyright law literature Books by Lawrence Lessig
https://en.wikipedia.org/wiki/Typosquatting
Typosquatting, also called URL hijacking, a sting site, a cousin domain, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Should a user accidentally enter an incorrect website address, they may be led to any URL (including an alternative website owned by a cybersquatter). The typosquatter's URL will usually be one of five kinds, all similar to the victim site address: A common misspelling, or foreign language spelling, of the intended site A misspelling based on a typographical error A plural of a singular domain name A different top-level domain: (e.g. .com instead of .org) An abuse of the Country Code Top-Level Domain (ccTLD) (.cm, .co, or .om instead of .com) Similar abuses: Combosquatting - no misspelling, but appending an arbitrary word that appears legitimate, but that anyone could register. Doppelganger domain - omitting a period or inserting an extra period Appending terms such as sucks or - to a domain name Once in the typosquatter's site, the user may also be tricked into thinking that they are in fact in the real site, through the use of copied or similar logos, website layouts, or content. Spam emails sometimes make use of typosquatting URLs to trick users into visiting malicious sites that look like a given bank's site, for instance. The Magniber ransomware is being distributed in a typosquatting method that exploits typos made when entering domains, targeting mainly Chrome and Edge users. Motivation There are several different reasons for typosquatters buying a typo domain: To try to sell the typo domain back to the brand owner To monetize the domain through advertising revenues from direct navigation misspellings of the intended domain To redirect the typo-traffic to a competitor To redirect the typo-traffic back to the brand itself, but through an affiliate link, thus earning commissions from the brand owner's affiliate program As a phishing scheme to mimic the brand's site, while intercepting passwords which the visitor enters unsuspectingly To install drive-by malware or revenue generating adware onto the visitors' devices To harvest misaddressed e-mail messages mistakenly sent to the typo domain To express an opinion that is different from the intended website's opinion By legitimate site owners, to block malevolent use of the typo domain by others To annoy users of the intended site Examples Many companies, including Verizon, Lufthansa, and Lego, have gained reputations for aggressively chasing down typosquatted names. Lego, for example, has spent roughly US$500,000 on taking 309 cases through UDRP proceedings. Celebrities have also frequently pursued their domain names. Prominent examples include basketball player Dirk Nowitzki's UDRP of DirkSwish.com and actress Eva Longoria's UDRP of EvaLongoria.org. Goggle, a typosquatted version of Google, was the subject of a 2006 web safety pr
https://en.wikipedia.org/wiki/IT%20law
Information technology law (also called cyberlaw) concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitized) information and software, information security and electronic commerce aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction. History The regulation of information technology, through computing and the internet evolved out of the development of the first publicly funded networks, such as ARPANET and NSFNET in the United States or JANET in the United Kingdom. Areas of law IT law does not constitute a separate area of law rather it encompasses aspects of contract, intellectual property, privacy and data protection laws. Intellectual property is an important component of IT law, including copyright, rules on fair use, and special rules on copy protection for digital media, and circumvention of such schemes. The area of software patents is controversial, and still evolving in Europe and elsewhere. The related topics of software licenses, end user license agreements, free software licenses and open-source licenses can involve discussion of product liability, professional liability of individual developers, warranties, contract law, trade secrets and intellectual property. In various countries, areas of the computing and communication industries are regulated – often strictly – by governmental bodies. There are rules on the uses to which computers and computer networks may be put, in particular there are rules on unauthorized access, data privacy and spamming. There are also limits on the use of encryption and of equipment which may be used to defeat copy protection schemes. The export of hardware and software between certain states within the United States is also controlled. There are laws governing trade on the Internet, taxation, consumer protection, and advertising. There are laws on censorship versus freedom of expression, rules on public access to government information, and individual access to information held on them by private bodies. There are laws on what data must be retained for law enforcement, and what may not be gathered or retained, for privacy reasons. In certain circumstances and jurisdictions, computer communications may be used in evidence, and to establish contracts. New methods of tapping and surveillance made possible by computers have wildly differing rules on how they may be used by law enforcement bodies and as evidence in court. Computerized voting technology, from polling machines to internet and mobile-phone voting, raise a host of legal issues. Some states limit access to the Internet, by law as well as by technical means. Jurisdiction Issues of jurisdiction and sovereignty have quickly come to the fore in the era of the
https://en.wikipedia.org/wiki/Time%20shifting
In broadcasting, time shifting is the recording of programming to a storage medium to be viewed or listened to after the live broadcasting. Typically, this refers to TV programming but it can also refer to radio shows via podcasts. In recent years, the advent of the digital video recorder (DVR) has made time shifting easier, by using an electronic program guide (EPG) and recording shows onto a hard disk. Some DVRs have other possible time-shifting methods, such as being able to start watching the recorded show from the beginning even if the recording is not yet complete. In the past, time shifting was done with a video cassette recorder (VCR) and its timer function, in which the VCR tunes into the appropriate station and records the show onto video tape. Certain broadcasters transmit timeshifted versions of their channels, usually carrying programming from one hour in the past, to enable those without recording abilities to resolve conflicts and those with recording abilities more flexibility in scheduling conflicting recordings. (See timeshift channel.) In the United Kingdom and Ireland Freesat+, Freeview+, Sky+, V+, TiVo, YouView and BT Vision services in Ireland and the UK allow one to timeshift. Africa DStv, based in South Africa, offers PVR set-top boxes to countries across Africa which allow time shifting of live and recorded television, using a remote. History in the United States The idea of a consumer pausing a live television broadcast was depicted in popular media as early as November 1966 at the end of Season 2, Episode 12 of I Dream of Jeannie, when character Major Nelson asked his genie to pause a live broadcast of a football game so that they could continue to watch it from that point after a grocery shopping trip. With the advent of digital video recorders ReplayTV and TiVo, launched at the 1999 Consumer Electronics Show in Las Vegas, Nevada, it became possible in practice for consumers to purchase devices that supported pausing live television broadcasts and "chase play" (playing back a delayed version of a recorded live stream while simultaneously continuing to record the live stream). The major legal issue involved in time shifting concerns "fair use" law and the possibility of copyright infringement. This legal issue was first raised in the landmark court case of Sony Corp. of America v. Universal City Studios, Inc. or the "Betamax case". In the 1970s, Universal and Disney sued Sony, claiming its timed recording capability amounted to copyright infringement. The Supreme Court of the United States found in favor of Sony; the majority decision held that time shifting was a fair use, represented no substantial harm to the copyright holder and would not contribute to a diminished marketplace for its product. RCA mentioned time shifting in its marketing as a reason to buy VCRs, even while an on-screen disclaimer mentioned the Betamax case and cautioned that "Such recordings should not be made". By 1985 cable movie channels
https://en.wikipedia.org/wiki/Take%20My%20Life%2C%20Please
"Take My Life, Please" is the tenth episode of the twentieth season of the American animated television series The Simpsons. It originally aired on the Fox network in the United States on February 15, 2009. In the episode, Homer finds out that the class presidential election he lost in high school was rigged, and he gets the opportunity to find out what his life would have been like if he had become class president. The episode was written by Don Payne and directed by Steven Dean Moore. It was the first episode of The Simpsons to air in 16:9 720p high-definition television. It was also the first episode to use the show's third opening sequence. Since airing, the episode has received mixed reviews from television critics. 6.82 million people watched the episode, and coupled with an episode of King of the Hill, it won its hour in the 18–49 demographic. Plot A man named Vance Connor is inducted into the Springfield Wall of Fame, and Homer recounts how he ran against Vance for class president in high school and lost. Later, at Moe's Tavern, Lenny and Carl confess to Homer that his old high school principal Harlan Dondelinger had ordered them to bury the ballot box containing the votes to the election. After they dig up the ballot box, Lisa counts the votes, and Homer is shocked to see that the votes put him as the winner. Outraged, he confronts a retired Dondelinger, who explains that two students had talked their classmates into voting for Homer so that they could humiliate him if he had won, so Dondelinger hid the ballot box to try to spare Homer from the embarrassment. During a family dinner at Luigi's Restaurant, Luigi Risotto introduces Homer to his saucier, who he claims can tell what someone's life could have been like by stirring tomato sauce in a certain way. By using his magical tomato sauce, he helps Homer see what his life would have been like if he had won the election: Homer would have been rich, he would have had a better position at the nuclear plant, would have lived in a mansion on the site where the Flanders now live, would have been closer to Grampa who would live in the house in which the Simpsons currently live, and Homer would not be bald. The kids would not have been born because Homer would have remembered to use protection before sex; Marge is confused by this and tries to convince Homer that their lives would be miserable without Bart, Lisa and Maggie. He remains unconvinced and becomes more depressed after seeing that his life would have been a lot better if he had won, even leaping into the pot to try to "live in the sauce", much to the saucier's consternation. Homer remains at home for the next couple of days. Marge convinces a reluctant Homer to take a walk with her to the Springfield Wall of Fame, where he learns that his name has been put up after Marge confronted Dondelinger and forced him to do the right thing. A boy then has his picture taken with him. Homer, now much happier, goes to a Korean restaurant that
https://en.wikipedia.org/wiki/Screenshot
A screenshot (also known as screen capture or screen grab) is a digital image that shows the contents of a computer display. A screenshot is created by the operating system or software running on the device powering the display. Additionally, screenshots can be captured by an external camera, using photography to capture contents on the screen. Screenshot techniques Digital techniques The first screenshots were created with the first interactive computers around 1960. Through the 1980s, computer operating systems did not universally have built-in functionality for capturing screenshots. Sometimes text-only screens could be dumped to a text file, but the result would only capture the content of the screen, not the appearance, nor were graphics screens preservable this way. Some systems had a BSAVE command that could be used to capture the area of memory where screen data was stored, but this required access to a BASIC prompt. Systems with composite video output could be connected to a VCR, and entire screencasts preserved this way. Most screenshots are raster images, but some vector-based GUI environments like Cairo are capable of generating vector screenshots. Photographic techniques Screenshot kits were available for standard (film) cameras that included a long antireflective hood to attach between the screen and camera lens, as well as a closeup lens for the camera. Polaroid film was popular for capturing screenshots, because of the instant results and close-focusing capability of Polaroid cameras. In 1988, Polaroid introduced Spectra film with a 9.2 × 7.3 image size more suited to the 4:3 aspect ratio of CRT screens. Screenshot tools Notable software for capturing screenshots include: Bandicam Camtasia CamStudio CloudApp Greenshot Gyazo IrfanView Jing KSnapshot Lightscreen Microsoft Snipping Tool Snip and Sketch Monosnap PrintKey 2000 scrot ShareX Shotty Snagit Snapz Pro X VVCap Window Clippings Xfire XnView Xwd PicPick Some web browsers, for example Firefox and Microsoft Edge, have a screenshot tool which can be used to capture a whole web page or part of it. Common technical issues Hardware overlays On Windows systems, screenshots of games and media players sometimes fail, resulting in a blank rectangle. The reason for this is that the graphics are bypassing the normal screen and going to a high-speed graphics processor on the graphics card by using a method called hardware overlay. Generally, there is no way to extract a computed image back out of the graphics card, though software may exist for special cases or specific video cards. One way these images can be captured is to turn off the hardware overlay. Because many computers have no hardware overlay, most programs are built to work without it, just a little slower. In Windows XP, this is disabled by opening the Display Properties menu, clicking on the "Settings" tab, clicking, "Advanced", "Troubleshoot", and moving the Hardware Acceleration Slider t
https://en.wikipedia.org/wiki/Persistent%20data
Persistent data in the field of data processing denotes information that is infrequently accessed and not likely to be modified. Static data is information, for example a record, that does not change and may be intended to be permanent. It may have previously been categorized as persistent or dynamic. Dynamic data (also known as transactional data) is information that is asynchronously updated as new information becomes available. Updates to dynamic data may come at any time, with periods of inactivity in between. See also JBND, Java library for programs handling persistent data Persistent data structure Persistent memory Phantom OS - persistent operation system implementing concept of persistent data References Computer data
https://en.wikipedia.org/wiki/Decompiler
A decompiler is a computer program that translates an executable file to high-level source code. It does therefore the opposite of a typical compiler, which translates a high-level language to a low-level language. While disassemblers translate an executable into assembly language, decompilers go a step further and translate the code into a higher level language such as C or Java, requiring more sophisticated techniques. Decompilers are usually unable to perfectly reconstruct the original source code, thus will frequently produce obfuscated code. Nonetheless, they remain an important tool in the reverse engineering of computer software. Introduction The term decompiler is most commonly applied to a program which translates executable programs (the output from a compiler) into source code in a (relatively) high level language which, when compiled, will produce an executable whose behavior is the same as the original executable program. By comparison, a disassembler translates an executable program into assembly language (and an assembler could be used for assembling it back into an executable program). Decompilation is the act of using a decompiler, although the term can also refer to the output of a decompiler. It can be used for the recovery of lost source code, and is also useful in some cases for computer security, interoperability and error correction. The success of decompilation depends on the amount of information present in the code being decompiled and the sophistication of the analysis performed on it. The bytecode formats used by many virtual machines (such as the Java Virtual Machine or the .NET Framework Common Language Runtime) often include extensive metadata and high-level features that make decompilation quite feasible. The application of debug data, i.e. debug-symbols, may enable to reproduce the original names of variables and structures and even the line numbers. Machine language without such metadata or debug data is much harder to decompile. Some compilers and post-compilation tools produce obfuscated code (that is, they attempt to produce output that is very difficult to decompile, or that decompiles to confusing output). This is done to make it more difficult to reverse engineer the executable. While decompilers are normally used to (re-)create source code from binary executables, there are also decompilers to turn specific binary data files into human-readable and editable sources. Design Decompilers can be thought of as composed of a series of phases each of which contributes specific aspects of the overall decompilation process. Loader The first decompilation phase loads and parses the input machine code or intermediate language program's binary file format. It should be able to discover basic facts about the input program, such as the architecture (Pentium, PowerPC, etc.) and the entry point. In many cases, it should be able to find the equivalent of the main function of a C program, which is the start of the use
https://en.wikipedia.org/wiki/Mark%20Vanco
Mark Vanco (born October 13, 1968) is an American designer and artist, associated with the cyberpunk aesthetic. He is the creator of Rotor, a clothing company. Early life Vanco was born in Columbus, Ohio, in the United States. His father was a designer and engineer who had been involved in the development of various products between the 1940s and 1960s, including pre-fabricated and solar-heated homes, plastic interlocking blocks and prosthetic limb designs for the United States military. Rotor Rotor, Vanco's clothing company and the origin of his artist name, initially sold mail-order shirts and accessories via adverts placed in technology culture magazines. Rotor products were later sold in international boutiques. In 1991, Rotor adverts started to appear in Mondo 2000, a San Francisco cult publication and predecessor of WIRED. The adverts featured Vanco's T-shirts, inspired by a mix of cyberpunk and Japanese consumer culture. In 1994, Vanco moved to Chicago to work with Mike Saenz of the digital entertainment company Reactor Inc. Together they worked on the development of digital entertainment content including 3D films and ideas for what Vanco would eventually describe as "designer entertainment". Between 1996 and 1998, Rotor was based in the downtown Los Angeles garment district on the border of Little Tokyo, in the same neighborhood as other street wear labels like Third Rail, Tribal and Twentyfive. Various music acts held after-parties and shows at the Rotor premises, including No Doubt and the Icelandic electro pop band Gus Gus. In 1996 Vanco collaborated with California-based industrial designer Rob Bruce on a design for the first urban fashion wearable computer, the Rotor "Streetwearable". Vanco consulted with designer/engineer Adam Oranchak on the processor and interface design, which was handheld, with a chorded keyboard and micro PC located on the user's upper back. Rotor's early wearable computer was a predecessor to the mainstream fashion establishment interest in cyberculture, wearable technology and the "accessorization" of digital devices into everyone's wardrobe. In 1997, Rotor was named one of "10 to Watch" by ASR (Action Sports Retailer), a sportswear industry magazine. Vanco was also invited to participate in various sponsored forums to discuss the future of fashion and technology in the United States and abroad. Rotor folded in 1998, with Vanco leaving due to physical and financial limitations. Rotor's influence Rotor advertisements and editorial coverage appeared on the pages of national and international publications including the Los Angeles Times, Ray Gun, New York's Paper Magazine, Surface, URB, UHF as well as Interactif (France) and various Japanese street wear magazines. Rotor adverts featured parody logos of gaming companies and franchises. Logos like Praystation, Nofriendo and Microshit were designed to be commentaries on videogame culture, technology tribalism, and a corporate media establishment. The lo
https://en.wikipedia.org/wiki/List%20of%20countries%20by%20intentional%20homicide%20rate%20by%20decade
List of countries by homicide rate by decade per year per 100,000 inhabitants. The reliability of underlying national homicide rate data may vary. Homicide demographics are affected by changes in trauma care, leading to changed lethality of violent assaults, so the homicide rate may not necessarily indicate the overall level of societal violence. 1900s 1910s 1920s 1930s 1940s 1950s 1960s 1970s 1980s 1990s 2000s 2010s References Homicide rate Country Rate ar:قائمة الدول حسب معدل جرائم القتل ru:Список стран по уровню убийств
https://en.wikipedia.org/wiki/Network%20configuration%20and%20change%20management
Network configuration and change management (NCCM) is a discipline in information technology. Organizations are using NCCM as a way to: automate changes; reduce network downtime; network device configuration backup & restore; meet compliance. See also Change Management (ITSM) Computer networking Information technology management Computer networking
https://en.wikipedia.org/wiki/List%20of%20Worldcons%20by%20city
This World Science Fiction Convention (Worldcon) list includes prior and scheduled Worldcons, sorted by major city. The data is maintained by the Long List Committee, a World Science Fiction Society sub-committee. External links Official Worldcon Long List
https://en.wikipedia.org/wiki/Chase%20%28algorithm%29
The chase is a simple fixed-point algorithm testing and enforcing implication of data dependencies in database systems. It plays important roles in database theory as well as in practice. It is used, directly or indirectly, on an everyday basis by people who design databases, and it is used in commercial systems to reason about the consistency and correctness of a data design. New applications of the chase in meta-data management and data exchange are still being discovered. The chase has its origins in two seminal papers of 1979, one by Alfred V. Aho, Catriel Beeri, and Jeffrey D. Ullman and the other by David Maier, Alberto O. Mendelzon, and Yehoshua Sagiv. In its simplest application the chase is used for testing whether the projection of a relation schema constrained by some functional dependencies onto a given decomposition can be recovered by rejoining the projections. Let t be a tuple in where R is a relation and F is a set of functional dependencies (FD). If tuples in R are represented as t1, ..., tk, the join of the projections of each ti should agree with t on where i = 1, 2, ..., k. If ti is not on , the value is unknown. The chase can be done by drawing a tableau (which is the same formalism used in tableau query). Suppose R has attributes A, B, ... and components of t are a, b, .... For ti use the same letter as t in the components that are in Si but subscript the letter with i if the component is not in Si. Then, ti will agree with t if it is in Si and will have a unique value otherwise. The chase process is confluent. There exist implementations of the chase algorithm, some of them are also open-source. Example Let R(A, B, C, D) be a relation schema known to obey the set of functional dependencies F = {A→B, B→C, CD→A}. Suppose R is decomposed into three relation schemas S1 = {A, D}, S2 = {A, C} and S3 = {B, C, D}. Determining whether this decomposition is lossless can be done by performing a chase as shown below. The initial tableau for this decomposition is: The first row represents S1. The components for attributes A and D are unsubscripted and those for attributes B and C are subscripted with i = 1. The second and third rows are filled in the same manner with S2 and S3 respectively. The goal for this test is to use the given F to prove that t = (a, b, c, d) is really in R. To do so, the tableau can be chased by applying the FDs in F to equate symbols in the tableau. A final tableau with a row that is the same as t implies that any tuple t in the join of the projections is actually a tuple of R. To perform the chase test, first decompose all FDs in F so each FD has a single attribute on the right hand side of the "arrow". (In this example, F remains unchanged because all of its FDs already have a single attribute on the right hand side: F = {A→B, B→C, CD→A}.) When equating two symbols, if one of them is unsubscripted, make the other be the same so that the final tableau can have a row that is exactly the same as t =
https://en.wikipedia.org/wiki/Dependency%20theory%20%28database%20theory%29
Dependency theory is a subfield of database theory which studies implication and optimization problems related to logical constraints, commonly called dependencies, on databases. The best known class of such dependencies are functional dependencies, which form the foundation of keys on database relations. Another important class of dependencies are the multivalued dependencies. A key algorithm in dependency theory is the chase, and much of the theory is devoted to its study. Dependencies functional dependency join dependency multivalued dependency tuple-generating dependency equality-generating dependency embedded dependency inclusion dependency full typed dependency Database theory Database constraints
https://en.wikipedia.org/wiki/KGRD
KGRD is a Christian radio station licensed to Orchard, Nebraska, broadcasting on 105.3 MHz FM. It is owned by The Praise Network, Inc. KGRD airs Christian Contemporary Music, as well as a variety of Christian Talk and Teaching programs including; Insight for Living with Chuck Swindoll, Turning Point with David Jeremiah, Focus on the Family, Break Point with Chuck Colson, and Unshackled!. Translators KGRD is also heard on five full powered stations, KPNO 90.9 in Norfolk, Nebraska, KGKD 90.5 in Columbus, Nebraska, KGRJ 89.9 in Chamberlain, South Dakota, KGRH 88.1 in the Mitchell, South Dakota area, and KGRU 89.5 in Burwell, Nebraska, as well as three translators in Northern Nebraska and Southern South Dakota. References External links KGRD's official website GRD Orchard, Nebraska Mass media in the Mitchell, South Dakota micropolitan area Radio stations established in 1987 1987 establishments in Nebraska
https://en.wikipedia.org/wiki/Probabilistic%20database
Most real databases contain data whose correctness is uncertain. In order to work with such data, there is a need to quantify the integrity of the data. This is achieved by using probabilistic databases. A probabilistic database is an uncertain database in which the possible worlds have associated probabilities. Probabilistic database management systems are currently an active area of research. "While there are currently no commercial probabilistic database systems, several research prototypes exist..." Probabilistic databases distinguish between the logical data model and the physical representation of the data much like relational databases do in the ANSI-SPARC Architecture. In probabilistic databases this is even more crucial since such databases have to represent very large numbers of possible worlds, often exponential in the size of one world (a classical database), succinctly. Terminology In a probabilistic database, each tuple is associated with a probability between 0 and 1, with 0 representing that the data is certainly incorrect, and 1 representing that it is certainly correct. Possible worlds A probabilistic database could exist in multiple states. For example, if there is uncertainty about the existence of a tuple in the database, then the database could be in two different states with respect to that tuple—the first state contains the tuple, while the second one does not. Similarly, if an attribute can take one of the values x, y or z, then the database can be in three different states with respect to that attribute. Each of these states is called a possible world. Consider the following database: (Here {b3, b3′, b3′′} denotes that the attribute can take any of the values b3, b3′ or b3′′) Assuming that there is uncertainty about the first tuple, certainty about the second tuple, and uncertainty about the value of attribute B in the third tuple. Then the actual state of the database may or may not contain the first tuple (depending on whether it is correct or not). Similarly, the value of the attribute B may be b3, b3′ or b3′′. Consequently, the possible worlds corresponding to the database are as follows: Types of Uncertainties There are essentially two kinds of uncertainties that could exist in a probabilistic database, as described in the table below: By assigning values to random variables associated with the data items, different possible worlds can be represented. History The first published use of the term "probabilistic database" was probably in the 1987 VLDB conference paper "The theory of probabilistic databases", by Cavallo and Pittarelli. The title (of the 11 page paper) was intended as a bit of a joke, since David Maier's 600 page monograph, The Theory of Relational Databases, would have been familiar at that time to most of the conference participants and readers of the conference proceedings. References External links The MayBMS project at Cornell University (sourceforge.net project site) The MystiQ
https://en.wikipedia.org/wiki/Emulator
In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest). An emulator typically enables the host system to run software or use peripheral devices designed for the guest system. Emulation refers to the ability of a computer program in an electronic device to emulate (or imitate) another program or device. Many printers, for example, are designed to emulate HP LaserJet printers because so much software is written for HP printers. If a non-HP printer emulates an HP printer, any software written for a real HP printer will also run in the non-HP printer emulation and produce equivalent printing. Since at least the 1990s, many video game enthusiasts and hobbyists have used emulators to play classic arcade games from the 1980s using the games' original 1980s machine code and data, which is interpreted by a current-era system, and to emulate old video game consoles. A hardware emulator is an emulator which takes the form of a hardware device. Examples include the DOS-compatible card installed in some 1990s-era Macintosh computers, such as the Centris 610 or Performa 630, that allowed them to run personal computer (PC) software programs and field-programmable gate array-based hardware emulators. The Church-Turing thesis implies that theoretically, any operating environment can be emulated within any other environment, assuming memory limitations are ignored. However, in practice, it can be quite difficult, particularly when the exact behavior of the system to be emulated is not documented and has to be deduced through reverse engineering. It also says nothing about timing constraints; if the emulator does not perform as quickly as it did using the original hardware, the software inside the emulation may run much more slowly (possibly triggering timer interrupts that alter behavior). Types Most emulators just emulate a hardware architecture—if operating system firmware or software is required for the desired software, it must be provided as well (and may itself be emulated). Both the OS and the software will then be interpreted by the emulator, rather than being run by native hardware. Apart from this interpreter for the emulated binary machine's language, some other hardware (such as input or output devices) must be provided in virtual form as well; for example, if writing to a specific memory location should influence what is displayed on the screen, then this would need to be emulated. While emulation could, if taken to the extreme, go down to the atomic level, basing its output on a simulation of the actual circuitry from a virtual power source, this would be a highly unusual solution. Emulators typically stop at a simulation of the documented hardware specifications and digital logic. Sufficient emulation of some hardware platforms requires extreme accuracy, down to the level of individual clock cycles, undocumented features, unpredictable analog
https://en.wikipedia.org/wiki/Yehoshua%20Sagiv
Yehoshua Chaim ("Shuky") Sagiv is a computer scientist and professor of computer science at the Hebrew University of Jerusalem. He obtained his PhD at Princeton University in 1978. His advisor was Jeffrey Ullman. Sagiv is one of the founders of the field of relational database theory, and specifically of dependency theory. He also did seminal work in the areas of semi-structured databases and local-as-view data integration. As of 2008, he is the most-published author in the ACM Symposium on Principles of Database Systems with 29 papers published there. He was also the winner of the ACM SIGMOD Test of Time Award in 2002. References Year of birth missing (living people) Living people Princeton University alumni Database researchers Israeli computer scientists